Skip to content

Commit 9fc831d

Browse files
authored
Merge pull request #280182 from MicrosoftDocs/main
Publish to live, Sunday 4:00PM PDT, 07/07
2 parents cc02d3d + c999d2b commit 9fc831d

File tree

7 files changed

+23
-26
lines changed

7 files changed

+23
-26
lines changed

articles/advisor/advisor-reference-performance-recommendations.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -455,25 +455,25 @@ Learn more about [Azure Database for PostgreSQL flexible server - Upscale Server
455455

456456
Our system shows that you have log_statement enabled, for better performance set it to NONE
457457

458-
Learn more about [Azure Database for PostgreSQL flexible server - Optimize log_statement settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging.md).
458+
Learn more about [Azure Database for PostgreSQL flexible server - Optimize log_statement settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging).
459459

460460
### Optimize log_duration settings for PostgreSQL on Azure Database
461461

462462
You may experience potential performance degradation due to logging settings. To optimize these settings, set the log_duration server parameter to OFF.
463463

464-
Learn more about [Learn more about Azure Database for PostgreSQL flexible server - Optimize log_duration settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging.md).
464+
Learn more about [Learn more about Azure Database for PostgreSQL flexible server - Optimize log_duration settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging).
465465

466466
### Optimize log_min_duration settings for PostgreSQL on Azure Database
467467

468468
Your log_min_duration server parameter is set to less than 60,000 ms (1 minute), which can lead to potential performance degradation. You can optimize logging settings by setting the log_min_duration_statement parameter to -1.
469469

470-
Learn more about [Azure Database for PostgreSQL flexible server - Optimize log_min_duration settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging.md).
470+
Learn more about [Azure Database for PostgreSQL flexible server - Optimize log_min_duration settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging).
471471

472472
### Optimize log_error_verbosity settings for PostgreSQL on Azure Database
473473

474474
Your server has been configured to output VERBOSE error logs. This can be useful for troubleshooting your database, but it can also result in reduced database performance. To improve performance, we recommend changing the log_error_verbosity server parameter to the DEFAULT setting.
475475

476-
Learn more about [Learn more about Azure Database for PostgreSQL flexible server - Optimize log_error_verbosity settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging.md).
476+
Learn more about [Learn more about Azure Database for PostgreSQL flexible server - Optimize log_error_verbosity settings for PostgreSQL on Azure Database](/azure/postgresql/flexible-server/concepts-logging).
477477

478478
### Identify if checkpoints are happening too often to improve PostgreSQL - Flexible Server performance
479479

articles/azure-monitor/alerts/alerts-common-schema.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,9 @@ For sample alerts that use the common schema, see [Sample alert payloads](alerts
108108
| firedDateTime | The date and time when the alert instance was fired in Coordinated Universal Time (UTC). |
109109
| resolvedDateTime | The date and time when the monitor condition for the alert instance is set to **Resolved** in UTC. Currently only applicable for metric alerts.|
110110
| description | The description, as defined in the alert rule. |
111+
| alertRuleID | The ID of the alert rule that generated the alert instance.|
112+
| resourceType | The resource type affected by the alert.|
113+
| resourceGroupName | Name of the resource group for the impacted resource.|
111114
|essentialsVersion| The version number for the essentials section.|
112115
|alertContextVersion | The version number for the `alertContext` section.|
113116
|investigationLink | Link to investigate the alert in Azure Monitor. Currently requires limited preview registration.|

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -367,8 +367,6 @@
367367
items:
368368
- name: HPE ProLiant DL20 Gen11 (4SFF)
369369
href: appliance-catalog/hpe-proliant-dl20-gen-11.md
370-
- name: HPE ProLiant DL20 Gen10 Plus (4SFF)
371-
href: appliance-catalog/hpe-proliant-dl20-plus-enterprise.md
372370
- name: Dell Edge 5200 (Rugged MIL-STD-810G)
373371
href: appliance-catalog/dell-edge-5200.md
374372
- name: Dell PowerEdge R350
@@ -377,8 +375,6 @@
377375
items:
378376
- name: HPE ProLiant DL20 Gen11 Plus (NHP 2LFF)
379377
href: appliance-catalog/hpe-proliant-dl20-gen-11-nhp-2lff.md
380-
- name: HPE ProLiant DL20 Gen10 Plus (NHP 2LFF)
381-
href: appliance-catalog/hpe-proliant-dl20-plus-smb.md
382378
- name: YS-techsystems YS-FIT2 (Rugged MIL-STD-810G)
383379
href: appliance-catalog/ys-techsystems-ys-fit2.md
384380
- name: DELL XE4 SFF
@@ -397,6 +393,10 @@
397393
items:
398394
- name: HPE ProLiant DL20 Gen10 (E1800)
399395
href: appliance-catalog/hpe-proliant-dl20-legacy.md
396+
- name: HPE ProLiant DL20 Gen10 Plus (NHP 2LFF)
397+
href: appliance-catalog/hpe-proliant-dl20-plus-smb.md
398+
- name: HPE ProLiant DL20 Gen10 Plus (4SFF)
399+
href: appliance-catalog/hpe-proliant-dl20-plus-enterprise.md
400400
- name: Dell PowerEdge R340 XL (E1800)
401401
href: appliance-catalog/dell-poweredge-r340-xl-legacy.md
402402
- name: HPE Edgeline EL300 (L500 Rugged)

articles/defender-for-iot/organizations/appliance-catalog/dell-poweredge-r340-xl-legacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ Configure the appliance BIOS only if you didn't purchase your appliance from Arr
156156

157157
1. Select **Boot Settings**.
158158

159-
1. For the **Boot Mode** option, select **BIOS**.
159+
1. For the **Boot Mode** option, select **UEFI**.
160160

161161
1. Select **Back**, and then select **Finish** to exit the BIOS settings.
162162

articles/defender-for-iot/organizations/appliance-catalog/hpe-proliant-dl20-plus-smb.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Installation includes:
8888

8989
- Enabling remote access and updating the default administrator password
9090
- Configuring iLO port on network port 1
91-
- Configuring BIOS and RAID1 settings
91+
- Configuring BIOS settings
9292
- Installing Defender for IoT software
9393

9494
> [!NOTE]
@@ -137,12 +137,6 @@ This procedure describes how to update the HPE BIOS configuration for your OT de
137137

138138
1. Select **Esc** twice to close the **System Configuration** form.
139139

140-
1. Select **Embedded RAID 1: HPE Smart Array E208i-a SR Gen 10** > **Array Configuration** > **Create Array**.
141-
142-
1. Select **Proceed to Next Form**.
143-
144-
1. In the **Set RAID Level** form, set the level to **RAID 1**.
145-
146140
1. Select **Proceed to Next Form**.
147141

148142
1. In the **Logical Drive Label** form, enter **Logical Drive 1**.

articles/defender-for-iot/organizations/appliance-catalog/index.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,6 @@ landingContent:
2727
linkLists:
2828
- linkListType: deploy
2929
links:
30-
- text: HPE ProLiant DL20 Gen10 Plus (4SFF)
31-
url: hpe-proliant-dl20-plus-enterprise.md
3230
- text: HPE ProLiant DL20 Gen11 (4SFF)
3331
url: hpe-proliant-dl20-gen-11.md
3432
- text: Dell Edge 5200 (Rugged MIL-STD-810G)
@@ -41,8 +39,6 @@ landingContent:
4139
linkLists:
4240
- linkListType: deploy
4341
links:
44-
- text: HPE ProLiant DL20 Gen10 Plus (NHP 2LFF)
45-
url: hpe-proliant-dl20-plus-smb.md
4642
- text: HPE ProLiant DL20 Gen11 Plus (NHP 2LFF)
4743
url: hpe-proliant-dl20-gen-11-nhp-2lff.md
4844
- text: YS-techsystems YS-FIT2 (Rugged MIL-STD-810G)
@@ -69,15 +65,19 @@ landingContent:
6965
linkLists:
7066
- linkListType: deploy
7167
links:
72-
- text: HPE ProLiant DL20 Gen10
68+
- text: HPE ProLiant DL20 Gen10 Plus (NHP 2LFF) (L500)
69+
url: hpe-proliant-dl20-plus-smb.md
70+
- text: HPE ProLiant DL20 Gen10 Plus (4SFF) (E1800)
71+
url: hpe-proliant-dl20-plus-enterprise.md
72+
- text: HPE ProLiant DL20 Gen10 (E1800)
7373
url: hpe-proliant-dl20-legacy.md
74-
- text: Dell PowerEdge R340 XL
74+
- text: Dell PowerEdge R340 XL (E1800)
7575
url: dell-poweredge-r340-xl-legacy.md
76-
- text: HPE ProLiant DL20 Gen10 (NHP 2LFF)
76+
- text: HPE ProLiant DL20 Gen10 (NHP 2LFF) (L500 Rugged)
7777
url: hpe-proliant-dl20-smb-legacy.md
78-
- text: HPE Edgeline EL300
78+
- text: HPE Edgeline EL300 (L500 Rugged)
7979
url: hpe-edgeline-el300.md
80-
- text: Neousys Nuvo-500LP
80+
- text: Neousys Nuvo-500LP (L100 Rugged)
8181
url: neousys-nuvo-5006lp.md
8282

8383
# - linkListType: reference

articles/nat-gateway/nat-metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ To create the alert, use the following steps:
271271
1. Select **Create** to create the alert rule.
272272

273273
>[!NOTE]
274-
>SNAT port exhaustion on your NAT gateway resource is uncommon. If you see SNAT port exhaustion, check if NAT gateway's idle timeout timer is set higher than the default amount of 4 minutes. A long idle timeout timer seeting can cause SNAT ports too be in hold down for longer, which results in exhausting SNAT port inventory sooner. You can also scale your NAT gateway with additional public IPs to increase NAT gateway's overall SNAT port inventory. To troubleshoot these kinds of issues, refer to the [NAT gateway connectivity troubleshooting guide](/azure/nat-gateway/troubleshoot-nat-connectivity#snat-exhaustion-due-to-nat-gateway-configuration).
274+
>SNAT port exhaustion on your NAT gateway resource is uncommon. If you see SNAT port exhaustion, check if NAT gateway's idle timeout timer is set higher than the default amount of 4 minutes. A long idle timeout timer setting can cause SNAT ports too be in hold down for longer, which results in exhausting SNAT port inventory sooner. You can also scale your NAT gateway with additional public IPs to increase NAT gateway's overall SNAT port inventory. To troubleshoot these kinds of issues, refer to the [NAT gateway connectivity troubleshooting guide](/azure/nat-gateway/troubleshoot-nat-connectivity#snat-exhaustion-due-to-nat-gateway-configuration).
275275
276276
### Alerts for NAT gateway resource health
277277

0 commit comments

Comments
 (0)