Skip to content

Commit 9a5ccdc

Browse files
authored
Merge pull request #256948 from MicrosoftDocs/main
11/1/2023 AM Publish
2 parents ef7d8a7 + 28b6ee0 commit 9a5ccdc

File tree

63 files changed

+577
-268
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+577
-268
lines changed

articles/api-management/developer-portal-extend-custom-functionality.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,11 @@ For more advanced use cases, you can create and upload a custom widget to the de
117117
npm run deploy
118118
```
119119
120-
If prompted, sign in to your Azure account.
120+
If prompted, sign in to your Azure account.
121+
122+
> [!NOTE]
123+
> When prompted to sign in, you must use a member account from the Microsoft Entra ID tenant that's associated with the Azure subscription where your API Management service resides. The account must not be a guest or a federated account and must have the appropriate permission to access the portal's administrative interface.
124+
121125
122126
The custom widget is now deployed to your developer portal. Using the portal's administrative interface, you can add it on pages in the developer portal and set values for any custom properties configured in the widget.
123127

articles/azure-monitor/agents/azure-monitor-agent-troubleshoot-linux-vm-rsyslog.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,10 @@ ms.reviewer: shseth
1313
Overview of Azure Monitor Agent for Linux Syslog collection and supported RFC standards:
1414

1515
- Azure Monitor Agent installs an output configuration for the system Syslog daemon during the installation process. The configuration file specifies the way events flow between the Syslog daemon and Azure Monitor Agent.
16-
- For `rsyslog` (most Linux distributions), the configuration file is `/etc/rsyslog.d/10-azuremonitoragent.conf`. For `syslog-ng`, the configuration file is `/etc/syslog-ng/conf.d/azuremonitoragent.conf`.
17-
- Azure Monitor Agent listens to a UNIX domain socket to receive events from `rsyslog` / `syslog-ng`. The socket path for this communication is `/run/azuremonitoragent/default_syslog.socket`.
16+
- For `rsyslog` (most Linux distributions), the configuration file is `/etc/rsyslog.d/10-azuremonitoragent-omfwd.conf`. For `syslog-ng`, the configuration file is `/etc/syslog-ng/conf.d/azuremonitoragent-tcp.conf`.
17+
- Azure Monitor Agent listens to a TCP port to receive events from `rsyslog` / `syslog-ng`. The port for this communication is logged at `/etc/opt/microsoft/azuremonitoragent/config-cache/syslog.port`.
18+
> [!NOTE]
19+
> Before Azure Monitor Agent version 1.28, it used a Unix domain socket instead of TCP port to receive events from rsyslog. `omfwd` output module in `rsyslog` offers spooling and retry mechanisms for improved reliability.
1820
- The Syslog daemon uses queues when Azure Monitor Agent ingestion is delayed or when Azure Monitor Agent isn't reachable.
1921
- Azure Monitor Agent ingests Syslog events via the previously mentioned socket and filters them based on facility or severity combination from data collection rule (DCR) configuration in `/etc/opt/microsoft/azuremonitoragent/config-cache/configchunks/`. Any `facility` or `severity` not present in the DCR is dropped.
2022
- Azure Monitor Agent attempts to parse events in accordance with **RFC3164** and **RFC5424**. It also knows how to parse the message formats listed on [this website](./azure-monitor-agent-overview.md#data-sources-and-destinations).
@@ -85,10 +87,10 @@ rsyslogd 1484 syslog 14w REG 8,1 3601566564 0 35280 /var/log/syslog (
8587
### Rsyslog default configuration logs all facilities to /var/log/
8688
On some popular distros (for example, Ubuntu 18.04 LTS), rsyslog ships with a default configuration file (`/etc/rsyslog.d/50-default.conf`), which logs events from nearly all facilities to disk at `/var/log/syslog`. RedHat/CentOS family Syslog events are stored under `/var/log/` but in a different file: `/var/log/messages`.
8789

88-
Azure Monitor Agent doesn't rely on Syslog events being logged to `/var/log/`. Instead, it configures the rsyslog service to forward events over a socket directly to the `azuremonitoragent` service process (mdsd).
90+
Azure Monitor Agent doesn't rely on Syslog events being logged to `/var/log/`. Instead, it configures the rsyslog service to forward events over a TCP port directly to the `azuremonitoragent` service process (mdsd).
8991

9092
#### Fix: Remove high-volume facilities from /etc/rsyslog.d/50-default.conf
91-
If you're sending a high log volume through rsyslog and your system is set up to log events for these facilities, consider modifying the default rsyslog config to avoid logging and storing them under `/var/log/`. The events for this facility would still be forwarded to Azure Monitor Agent because rsyslog uses a different configuration for forwarding placed in `/etc/rsyslog.d/10-azuremonitoragent.conf`.
93+
If you're sending a high log volume through rsyslog and your system is set up to log events for these facilities, consider modifying the default rsyslog config to avoid logging and storing them under `/var/log/`. The events for this facility would still be forwarded to Azure Monitor Agent because rsyslog uses a different configuration for forwarding placed in `/etc/rsyslog.d/10-azuremonitoragent-omfwd.conf`.
9294

9395
1. For example, to remove `local4` events from being logged at `/var/log/syslog` or `/var/log/messages`, change this line in `/etc/rsyslog.d/50-default.conf` from this snippet:
9496

articles/azure-monitor/agents/data-collection-syslog.md

Lines changed: 40 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -104,59 +104,64 @@ If your VM doesn't have Azure Monitor Agent installed, the DCR deployment trigge
104104
When Azure Monitor Agent is installed on a Linux machine, it installs a default Syslog configuration file that defines the facility and severity of the messages that are collected if Syslog is enabled in a DCR. The configuration file is different depending on the Syslog daemon that the client has installed.
105105

106106
### Rsyslog
107-
On many Linux distributions, the rsyslogd daemon is responsible for consuming, storing, and routing log messages sent by using the Linux Syslog API. Azure Monitor Agent uses the UNIX domain socket output module (`omuxsock`) in rsyslog to forward log messages to Azure Monitor Agent.
107+
On many Linux distributions, the rsyslogd daemon is responsible for consuming, storing, and routing log messages sent by using the Linux Syslog API. Azure Monitor Agent uses the TCP forward output module (`omfwd`) in rsyslog to forward log messages to Azure Monitor Agent.
108108

109109
The Azure Monitor Agent installation includes default config files that get placed under the following directory: `/etc/opt/microsoft/azuremonitoragent/syslog/rsyslogconf/`
110110

111111
When Syslog is added to a DCR, these configuration files are installed under the `etc/rsyslog.d` system directory and rsyslog is automatically restarted for the changes to take effect. These files are used by rsyslog to load the output module and forward the events to the Azure Monitor Agent daemon by using defined rules.
112112

113-
The built-in `omuxsock` module can't be loaded more than once. For this reason, the configurations for loading of the module and forwarding of the events with corresponding forwarding format template are split in two different files. Its default contents are shown in the following example. This example collects Syslog messages sent from the local agent for all facilities with all log levels.
113+
Its default contents are shown in the following example. This example collects Syslog messages sent from the local agent for all facilities with all log levels.
114114
```
115-
$ cat /etc/rsyslog.d/10-azuremonitoragent.conf
115+
$ cat /etc/rsyslog.d/10-azuremonitoragent-omfwd.conf
116116
# Azure Monitor Agent configuration: forward logs to azuremonitoragent
117-
$OMUxSockSocket /run/azuremonitoragent/default_syslog.socket
118-
template(name="AMA_RSYSLOG_TraditionalForwardFormat" type="string" string="<%PRI%>%TIMESTAMP% %HOSTNAME% %syslogtag%%msg:::sp-if-no-1st-sp%%msg%")
119-
$OMUxSockDefaultTemplate AMA_RSYSLOG_TraditionalForwardFormat
120-
# Forwarding all events through Unix Domain Socket
121-
*.* :omuxsock:
117+
118+
template(name="AMA_RSYSLOG_TraditionalForwardFormat" type="string" string="<%PRI%>%TIMESTAMP% %HOSTNAME% %syslogtag%%msg:::sp-if-no-1st-sp%%msg%")
119+
# queue.workerThreads sets the maximum worker threads, it will scale back to 0 if there is no activity
120+
# Forwarding all events through TCP port
121+
*.* action(type="omfwd"
122+
template="AMA_RSYSLOG_TraditionalForwardFormat"
123+
queue.type="LinkedList"
124+
queue.filename="omfwd-azuremonitoragent"
125+
queue.maxFileSize="32m"
126+
action.resumeRetryCount="-1"
127+
action.resumeInterval="5"
128+
action.reportSuspension="on"
129+
action.reportSuspensionContinuation="on"
130+
queue.size="25000"
131+
queue.workerThreads="100"
132+
queue.dequeueBatchSize="2048"
133+
queue.saveonshutdown="on"
134+
target="127.0.0.1" Port="28330" Protocol="tcp")
122135
```
123136

124-
```
125-
$ cat /etc/rsyslog.d/05-azuremonitoragent-loadomuxsock.conf
126-
# Azure Monitor Agent configuration: load rsyslog forwarding module.
127-
$ModLoad omuxsock
128-
```
129-
130137
On some legacy systems, such as CentOS 7.3, we've seen rsyslog log formatting issues when a traditional forwarding format is used to send Syslog events to Azure Monitor Agent. For these systems, Azure Monitor Agent automatically places a legacy forwarder template instead:
131138

132139
`template(name="AMA_RSYSLOG_TraditionalForwardFormat" type="string" string="%TIMESTAMP% %HOSTNAME% %syslogtag%%msg:::sp-if-no-1st-sp%%msg%\n")`
133140

134141
### Syslog-ng
135142

136-
The configuration file for syslog-ng is installed at `/etc/opt/microsoft/azuremonitoragent/syslog/syslog-ngconf/azuremonitoragent.conf`. When Syslog collection is added to a DCR, this configuration file is placed under the `/etc/syslog-ng/conf.d/azuremonitoragent.conf` system directory and syslog-ng is automatically restarted for the changes to take effect.
143+
The configuration file for syslog-ng is installed at `/etc/opt/microsoft/azuremonitoragent/syslog/syslog-ngconf/azuremonitoragent-tcp.conf`. When Syslog collection is added to a DCR, this configuration file is placed under the `/etc/syslog-ng/conf.d/azuremonitoragent-tcp.conf` system directory and syslog-ng is automatically restarted for the changes to take effect.
137144

138145
The default contents are shown in the following example. This example collects Syslog messages sent from the local agent for all facilities and all severities.
139146
```
140-
$ cat /etc/syslog-ng/conf.d/azuremonitoragent.conf
141-
# Azure MDSD configuration: syslog forwarding config for mdsd agent options {};
142-
143-
# during install time, we detect if s_src exist, if it does then we
144-
145-
# replace it by appropriate source name like in redhat 's_sys'
146-
147-
# Forwrding using unix domain socket
148-
149-
destination d_azure_mdsd {
150-
151-
unix-dgram("/run/azuremonitoragent/default_syslog.socket"
152-
153-
flags(no_multi_line)
154-
155-
);
156-
};
157-
158-
log { source(s_src); # will be automatically parsed from /etc/syslog-ng/syslog-ng.conf
159-
destination(d_azure_mdsd); };
147+
$ cat /etc/syslog-ng/conf.d/azuremonitoragent-tcp.conf
148+
# Azure MDSD configuration: syslog forwarding config for mdsd agent
149+
options {};
150+
151+
# during install time, we detect if s_src exist, if it does then we
152+
# replace it by appropriate source name like in redhat 's_sys'
153+
# Forwrding using tcp
154+
destination d_azure_mdsd {
155+
network("127.0.0.1"
156+
port(28330)
157+
log-fifo-size(25000));
158+
};
159+
160+
log {
161+
source(s_src); # will be automatically parsed from /etc/syslog-ng/syslog-ng.conf
162+
destination(d_azure_mdsd);
163+
flags(flow-control);
164+
};
160165
```
161166

162167
>[!Note]

articles/azure-monitor/vm/vminsights-performance.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ Limitations in performance collection with VM insights:
2626

2727
- Available memory isn't available in all Linux versions, including Red Hat Linux (RHEL) 6 and CentOS 6. It will be available in Linux versions that use [kernel version 3.14](http://www.man7.org/linux/man-pages/man1/free.1.html) or higher. It might be available in some kernel versions between 3.0 and 3.14.
2828
- Metrics are only available for data disks on Linux virtual machines that use XFS filesystem or EXT filesystem family (EXT2, EXT3, EXT4).
29+
- Collecting performance metrics from network shared drives is unsupported.
2930

3031
## Multi-VM perspective from Azure Monitor
3132

articles/backup/azure-backup-architecture-for-sap-hana-backup.md

Lines changed: 21 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: Azure Backup Architecture for SAP HANA Backup
2+
title: Azure Backup architecture for SAP HANA Backup
33
description: Learn about Azure Backup architecture for SAP HANA backup.
44
ms.topic: conceptual
5-
ms.date: 06/20/2023
5+
ms.date: 11/02/2023
66
ms.service: backup
77
ms.custom: ignite-2022
88
author: AbhishekMallick-MS
@@ -142,9 +142,27 @@ This section provides you with an understanding about the backup process of an H
142142
>[!Note]
143143
>For the HANA VMs that are already backed-up as individual machines, you can do the grouping only for future backups.
144144
145+
### Backup architecture for database instance snapshot
146+
147+
Azure Backup integrates Azure-managed disk full or incremental snapshots with HANA snapshot commands to deliver instant backup and recovery capabilities for HANA.
148+
149+
**SAP HANA database instance snapshot backup**
150+
151+
The backup architecture explains the different permissions that are required for the Azure Backup service, which resides on a HANA virtual machine (VM), to take snapshots of the managed disks and place them in a user-specified resource group that's mentioned in the policy. To do so, you can use the system-assigned managed identity of the source VM.
152+
153+
154+
:::image type="content" source="./media/azure-backup-architecture-for-sap-hana-backup/sap-hana-database-instance-snapshot-backup-architecture.png" alt-text="Diagram shows the SAP HANA database instance snapshot backup architecture.":::
155+
156+
**SAP HANA database instance snapshot restore**
157+
158+
The restore architecture explains the different permissions required during the restore operation. Azure Backup uses the target VM’s managed identity to read disk snapshots from a user-specified resource group, create disks in a target resource group, and attach them to the target VM.
159+
160+
:::image type="content" source="./media/azure-backup-architecture-for-sap-hana-backup/sap-hana-database-instance-snapshot-restore-architecture.png" alt-text="Diagram shows the SAP HANA database instance snapshot restore architecture.":::
161+
162+
145163
## Next steps
146164

147165
- Learn about the supported configurations and scenarios in the [SAP HANA backup support matrix](sap-hana-backup-support-matrix.md).
148166
- Learn about how to [backup SAP HANA databases in Azure VMs](backup-azure-sap-hana-database.md).
149167
- Learn about how to [backup SAP HANA System Replication databases in Azure VMs](sap-hana-database-with-hana-system-replication-backup.md).
150-
- Learn about how to [backup SAP HANA databases' snapshot instances in Azure VMs (preview)](sap-hana-database-instances-backup.md).
168+
- Learn about how to [backup SAP HANA databases' snapshot instances in Azure VMs](sap-hana-database-instances-backup.md).

articles/backup/backup-azure-sap-hana-database.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up an SAP HANA database to Azure with Azure Backup
33
description: In this article, learn how to back up an SAP HANA database to Azure virtual machines with the Azure Backup service.
44
ms.topic: how-to
5-
ms.date: 05/24/2023
5+
ms.date: 11/02/2023
66
ms.service: backup
77
author: AbhishekMallick-MS
88
ms.author: v-abhmallick
@@ -23,7 +23,7 @@ Refer to the [prerequisites](tutorial-backup-sap-hana-db.md#prerequisites) and t
2323

2424
### Establish network connectivity
2525

26-
For all operations, an SAP HANA database running on an Azure VM requires connectivity to the Azure Backup service, Azure Storage, and Microsoft Entra ID. This can be achieved by using private endpoints or by allowing access to the required public IP addresses or FQDNs. Not allowing proper connectivity to the required Azure services may lead to failure in operations like database discovery, configuring backup, performing backups, and restoring data.
26+
For all operations, an SAP HANA database running on an Azure VM requires connectivity to the Azure Backup service, Azure Storage, and Microsoft Entra ID. This can be achieved by using private endpoints or by allowing access to the required public IP addresses or FQDNs. Not allowing proper connectivity to the required Azure services might lead to failure in operations like database discovery, configuring backup, performing backups, and restoring data.
2727

2828
The following table lists the various alternatives you can use for establishing connectivity:
2929

@@ -32,7 +32,7 @@ The following table lists the various alternatives you can use for establishing
3232
| Private endpoints | Allow backups over private IPs inside the virtual network <br><br> Provide granular control on the network and vault side | Incurs standard private endpoint [costs](https://azure.microsoft.com/pricing/details/private-link/) |
3333
| NSG service tags | Easier to manage as range changes are automatically merged <br><br> No additional costs | Can be used with NSGs only <br><br> Provides access to the entire service |
3434
| Azure Firewall FQDN tags | Easier to manage since the required FQDNs are automatically managed | Can be used with Azure Firewall only |
35-
| Allow access to service FQDNs/IPs | No additional costs. <br><br> Works with all network security appliances and firewalls. <br><br> You can also use service endpoints for *Storage*. However, for *Azure Backup* and *Microsoft Entra ID*, you need to assign the access to the corresponding IPs/FQDNs. | A broad set of IPs or FQDNs may be required to be accessed. |
35+
| Allow access to service FQDNs/IPs | No additional costs. <br><br> Works with all network security appliances and firewalls. <br><br> You can also use service endpoints for *Storage*. However, for *Azure Backup* and *Microsoft Entra ID*, you need to assign the access to the corresponding IPs/FQDNs. | A broad set of IPs or FQDNs might be required to be accessed. |
3636
| [Virtual Network Service Endpoint](../virtual-network/virtual-network-service-endpoints-overview.md) | Can be used for Azure Storage. <br><br> Provides large benefit to optimize performance of data plane traffic. | Can't be used for Microsoft Entra ID, Azure Backup service. |
3737
| Network Virtual Appliance | Can be used for Azure Storage, Microsoft Entra ID, Azure Backup service. <br><br> **Data plane** <ul><li> Azure Storage: `*.blob.core.windows.net`, `*.queue.core.windows.net`, `*.blob.storage.azure.net` </li></ul> <br><br> **Management plane** <ul><li> Microsoft Entra ID: Allow access to FQDNs mentioned in sections 56 and 59 of [Microsoft 365 Common and Office Online](/microsoft-365/enterprise/urls-and-ip-address-ranges?view=o365-worldwide&preserve-view=true#microsoft-365-common-and-office-online). </li><li> Azure Backup service: `.backup.windowsazure.com` </li></ul> <br>Learn more about [Azure Firewall service tags](../firewall/fqdn-tags.md). | Adds overhead to data plane traffic and decrease throughput/performance. |
3838

@@ -108,6 +108,26 @@ You can also use the following FQDNs to allow access to the required services fr
108108

109109
5. No restart of any service is required. The Azure Backup service will attempt to route the Microsoft Entra traffic via the proxy server mentioned in the JSON file.
110110

111+
112+
##### Use outbound rules
113+
114+
If the Firewall or NSG settings block the `“management.azure.com”` domain from Azure Virtual Machine, snapshot backups will fail.
115+
116+
Create the following outbound rule and allow the domain name to do the database backup. Learn hot to [create outbound rules](../machine-learning/how-to-access-azureml-behind-firewall.md).
117+
118+
- **Source**: IP address of the VM.
119+
- **Destination**: Service Tag.
120+
- **Destination Service Tag**: `AzureResourceManager`
121+
122+
:::image type="content" source="./media/backup-azure-sap-hana-database/outbound-rule-hana-backups.png" alt-text="Screenshot shows the outbound rule settings." lightbox="./media/backup-azure-sap-hana-database/outbound-rule-hana-backups.png":::
123+
124+
125+
126+
127+
128+
129+
130+
111131
[!INCLUDE [How to create a Recovery Services vault](../../includes/backup-create-rs-vault.md)]
112132

113133
## Enable Cross Region Restore

0 commit comments

Comments
 (0)