Skip to content

Commit a3f962b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into eroverview
2 parents 0aad8b8 + b748b56 commit a3f962b

36 files changed

+356
-204
lines changed

articles/azure-functions/create-first-function-vs-code-python.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ In this section, you use Visual Studio Code to create a local Azure Functions pr
9191
7. Replace the `app.route()` method call with the following code:
9292

9393
```python
94-
@app.route(route="hello", auth_level=func.AuthLevel.ANONYMOUS)
94+
@app.route(route="hello", http_auth_level=func.AuthLevel.ANONYMOUS)
9595
```
9696

9797
This code enables your HTTP function endpoint to be called in Azure without having to provide an [Authorization keys](functions-bindings-http-webhook-trigger.md#authorization-keys). Local execution doesn't require authorization keys.
@@ -100,7 +100,7 @@ In this section, you use Visual Studio Code to create a local Azure Functions pr
100100

101101
```python
102102
@app.function_name(name="HttpTrigger1")
103-
@app.route(route="hello", auth_level=func.AuthLevel.ANONYMOUS)
103+
@app.route(route="hello", http_auth_level=func.AuthLevel.ANONYMOUS)
104104
def test_function(req: func.HttpRequest) -> func.HttpResponse:
105105
logging.info('Python HTTP trigger function processed a request.')
106106

articles/azure-monitor/essentials/data-collection-transformations-structure.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ Transformations in a [data collection rule (DCR)](data-collection-rule-overview.
3939

4040

4141

42+
### Required columns
43+
The output of every transformation must contain a valid timestamp in a column called `TimeGenerated` of type `datetime`. Make sure to include it in the final `extend` or `project` block! Creating or updating a DCR without `TimeGenerated` in the output of a transformation will lead to an error.
4244

4345
## Inline reference table
4446
The [datatable](/azure/data-explorer/kusto/query/datatableoperator?pivots=azuremonitor) operator isn't supported in the subset of KQL available to use in transformations. This operator would normally be used in KQL to define an inline query-time table. Use dynamic literals instead to work around this limitation.
@@ -329,4 +331,4 @@ Use [Identifier quoting](/azure/data-explorer/kusto/query/schema-entities/entity
329331

330332
## Next steps
331333

332-
- [Create a data collection rule](../agents/data-collection-rule-azure-monitor-agent.md) and an association to it from a virtual machine using the Azure Monitor agent.
334+
- [Create a data collection rule](../agents/data-collection-rule-azure-monitor-agent.md) and an association to it from a virtual machine using the Azure Monitor agent.

articles/azure-video-indexer/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,7 @@
9696
- name: Manage accounts
9797
items:
9898
- name: Manage access to your account
99+
displayName: RBAC, User, Users
99100
href: restricted-viewer-role.md
100101
- name: Connect an existing account to ARM
101102
href: connect-classic-account-to-arm.md

articles/azure-vmware/azure-vmware-solution-platform-updates.md

Lines changed: 28 additions & 25 deletions
Large diffs are not rendered by default.

articles/azure-vmware/concepts-network-design-considerations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Concepts - Network design considerations
33
description: Learn about network design considerations for Azure VMware Solution
44
ms.topic: conceptual
55
ms.service: azure-vmware
6-
ms.date: 08/19/2022
6+
ms.date: 12/22/2022
77
---
88

99
# Azure VMware Solution network design considerations
@@ -12,14 +12,14 @@ Azure VMware Solution offers a VMware private cloud environment accessible for u
1212

1313
## Azure VMware Solution compatibility with AS-Path Prepend
1414

15-
Azure VMware Solution is incompatible with AS-Path Prepend for redundant ExpressRoute configurations and doesn't honor the outbound path selection from Azure towards on-premises. If you're running 2 or more ExpressRoute paths between on-premises and Azure, and the listed [Prerequisites](#prerequisites) are true; you may experience impaired connectivity or no connectivity between your on-premises networks and Azure VMware Solution. The connectivity issue is caused when Azure VMware Solution doesn't see the AS-Path Prepend and uses ECMP to send traffic towards your environment over both ExR circuits. That action causes issues with stateful firewall inspection.
15+
Azure VMware Solution is incompatible with AS-Path Prepend for redundant ExpressRoute configurations and doesn't honor the outbound path selection from Azure towards on-premises. If you're running two or more ExpressRoute paths between on-premises and Azure, and the listed [Prerequisites](#prerequisites) are not met, you may experience impaired connectivity or no connectivity between your on-premises networks and Azure VMware Solution. The connectivity issue is caused when Azure VMware Solution doesn't see the AS-Path Prepend and uses equal cost multi-pathing (ECMP) to send traffic towards your environment over both ExpressRoute circuits. That action causes issues with stateful firewall inspection.
1616

1717
### Prerequisites
1818

1919
For AS-Path Prepend, you'll need to verify that all of the following listed connections are true:
2020

2121
> [!div class="checklist"]
22-
> * Both or all circuits are connected to Azure VMware Solution with global reach.
22+
> * Both or all circuits are connected to Azure VMware Solution with ExpressRoute Global Reach.
2323
> * The same netblocks are being advertised from two or more circuits.
2424
> * Stateful firewalls are in the network path.
2525
> * You're using AS-Path Prepend to force Azure to prefer one path over others.
@@ -29,7 +29,7 @@ Either 2 or 4 byte Public ASN numbers should be used and be compatible with Azur
2929
## Management VMs and default routes from on-premises
3030

3131
> [!IMPORTANT]
32-
> Azure VMware Solution Management VMs don't honor a default route from on-premises.
32+
> Azure VMware Solution Management VMs will not honor a default route from on-premises.
3333
3434
If you're routing back to your on-premises networks using only a default route advertised towards Azure, the vCenter Server and NSX-T Manager VMs won't be compatible with that route.
3535

@@ -98,7 +98,7 @@ The following diagram demonstrates how a single 0.0.0.0/0 is advertised to Azure
9898
> [!IMPORTANT]
9999
> An encapsulation protocol such as VXLAN or IPsec is required between the NVAs. Encapsulation is needed because the NVA NICs would learn the routes from Azure Route Server with the NVA as next hop and create a routing loop.
100100
101-
There's an alternative to using an overlay. Apply secondary NICs in the NVA that won't learn the routes from Azure Route Server and configure UDRs so that Azure can route traffic to the remote environment over those NICs. You can find more details in [Enterprise-scale network topology and connectivity for Azure VMware Solution](https://learn.microsoft.com/azure/cloud-adoption-framework/scenarios/azure-vmware/eslz-network-topology-connectivity#scenario-2-a-third-party-nva-in-hub-azure-virtual-network-inspects-all-network-traffic).
101+
There's an alternative to using an overlay. Apply secondary NICs in the NVA that won't learn the routes from Azure Route Server and configure UDRs so that Azure can route traffic to the remote environment over those NICs. You can find more details in [Enterprise-scale network topology and connectivity for Azure VMware Solution](/azure/cloud-adoption-framework/scenarios/azure-vmware/eslz-network-topology-connectivity#scenario-2-a-third-party-nva-in-hub-azure-virtual-network-inspects-all-network-traffic).
102102

103103
**This topology requires a complex initial set-up. Once the set-up is complete, the topology works as expected with minimal management overhead. See the following list of specific set-up complexities.**
104104

articles/azure-vmware/configure-port-mirroring-azure-vmware-solution.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure port mirroring to monitor network traffic th
44
ms.topic: how-to
55
ms.custom: contperf-fy22q1
66
ms.service: azure-vmware
7-
ms.date: 04/11/2022
7+
ms.date: 12/22/2022
88

99
# Customer intent: As an Azure service administrator, I want to configure port mirroring to monitor network traffic that involves forwarding a copy of each packet from one network switch port to another.
1010

@@ -16,6 +16,9 @@ After deploying Azure VMware Solution, you can configure port mirroring from the
1616

1717
In this how-to, you'll configure port mirroring to monitor network traffic, which involves forwarding a copy of each packet from one network switch port to another.
1818

19+
>[!IMPORTANT]
20+
>Port Mirroring is intended to be used as a temporary investigative tool and not a permanent network data collection feature. This is because NSX-T Data Center does not have the resoures to port mirror all traffic continuously. The IPFIX feature should be used if a continuous meta-data network flow logging solution is required.
21+
1922
## Prerequisites
2023

2124
An Azure VMware Solution private cloud with access to the vCenter Server and NSX-T Manager interfaces. For more information, see the [Configure networking](tutorial-configure-networking.md) tutorial.

articles/azure-vmware/configure-vmware-syslogs.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure VMware syslogs for Azure VMware Solution
33
description: Learn how to configure diagnostic settings to collect VMware syslogs for your Azure VMware Solution private cloud.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 12/07/2022
6+
ms.date: 12/22/2022
77

88
#Customer intent: As an Azure service administrator, I want to collect VMware syslogs and store it in my storage account so that I can view the vCenter Server logs and analyze for any diagnostic purposes.
99

@@ -16,11 +16,12 @@ Diagnostic settings are used to configure streaming export of platform logs and
1616
In this article, you'll configure a diagnostic setting to collect VMware syslogs for your Azure VMware Solution private cloud. You'll store the syslog to a storage account to view the vCenter Server logs and analyze for diagnostic purposes.
1717
>[!IMPORTANT]
1818
>The **VMware syslogs** contains the following logs:
19-
>- NSX-T Data Center Distributed Firewall logs
19+
>- vCenter Server logs
20+
>- ESXi logs
21+
>- vSAN logs
2022
>- NSX-T Manager logs
23+
>- NSX-T Data Center Distributed Firewall logs
2124
>- NSX-T Data Center Gateway Firewall logs
22-
>- ESXi logs
23-
>- vCenter Server logs
2425
>- NSX-T Data Center Edge Appliance logs
2526
2627
## Prerequisites

articles/azure-vmware/introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Introduction
33
description: Learn the features and benefits of Azure VMware Solution to deploy and manage VMware-based workloads in Azure. Azure VMware Solution SLA guarantees that Azure VMware management tools (vCenter Server and NSX Manager) will be available at least 99.9% of the time.
44
ms.topic: overview
55
ms.service: azure-vmware
6-
ms.date: 10/28/2022
6+
ms.date: 12/22/2022
77
ms.custom: engagement-fy23
88
---
99

@@ -36,7 +36,7 @@ Frequency of 2.7Ghz and Turbo of 4.0Ghz.
3636
- 38.4TB storage capacity with all NVMe based SSDs (With Random Read of 636500 IOPS and Random Write of 223300 IOPS)
3737
- 1.5TB of NVMe Cache
3838

39-
For pricing and region availability, see the [Azure VMware Solution pricing page](https://azure.microsoft.com/pricing/details/azure-vmware/) and see the [Products available by region page](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/).
39+
For pricing and region availability, see the [Azure VMware Solution pricing page](https://azure.microsoft.com/pricing/details/azure-vmware/) and see the [Products available by region page](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=azure-vmware&regions=all).
4040

4141
## Hosts, clusters, and private clouds
4242

articles/azure-vmware/move-ea-csp-subscriptions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how to move Azure VMware Solution subscripti
44
ms.custom: "subject-moving-resources, engagement-fy23"
55
ms.topic: how-to
66
ms.service: azure-vmware
7-
ms.date: 10/26/2022
7+
ms.date: 12/22/2022
88

99
# Customer intent: As an Azure service administrator, I want to move my Azure VMware Solution subscription to another subscription.
1010
---
@@ -18,7 +18,7 @@ This article describes how to move an Azure VMware Solution subscription to anot
1818
You should have at least contributor rights on both **source** and **target** subscriptions.
1919

2020
>[!IMPORTANT]
21-
>VNet and VNet gateway can't' be moved from one subscription to another. Additionally, moving your subscriptions has no impact on the management and workloads, like the vCenter, NSX, and workload virtual machines.
21+
>VNet and VNet gateway can't be moved from one subscription to another. Additionally, moving your subscriptions has no impact on the management and workloads, like the vCenter Server, NSX-T Data Center, vSAN, and workload virtual machines.
2222
2323
## Prepare and move
2424

articles/azure-vmware/rotate-cloudadmin-credentials.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Rotate the cloudadmin credentials for Azure VMware Solution
33
description: Learn how to rotate the vCenter Server credentials for your Azure VMware Solution private cloud.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 04/11/2022
6+
ms.date: 12/22/2022
77

88
#Customer intent: As an Azure service administrator, I want to rotate my cloudadmin credentials so that the HCX Connector has the latest vCenter Server CloudAdmin credentials.
99

@@ -12,7 +12,7 @@ ms.date: 04/11/2022
1212
# Rotate the cloudadmin credentials for Azure VMware Solution
1313

1414
>[!IMPORTANT]
15-
>Currently, rotating your NSX-T Manager *admin* credentials isn't supported. To rotate your NSX-T Manager password, submit a [support request](https://rc.portal.azure.com/#create/Microsoft.Support). This process might impact running HCX services.
15+
>Currently, rotating your NSX-T Manager *cloudadmin* credentials isn't supported. To rotate your NSX-T Manager password, submit a [support request](https://rc.portal.azure.com/#create/Microsoft.Support). This process might impact running HCX services.
1616
1717
In this article, you'll rotate the cloudadmin credentials (vCenter Server *CloudAdmin* credentials) for your Azure VMware Solution private cloud. Although the password for this account doesn't expire, you can generate a new one at any time.
1818

@@ -25,7 +25,7 @@ Consider and determine which services connect to vCenter Server as *cloudadmin@v
2525

2626
One way to determine which services authenticate to vCenter Server with the cloudadmin user is to inspect vSphere events using the vSphere Client for your private cloud. After you identify such services, and before rotating the password, you must stop these services. Otherwise, the services won't work after you rotate the password. You'll also experience temporary locks on your vCenter Server CloudAdmin account, as these services continuously attempt to authenticate using a cached version of the old credentials.
2727

28-
Instead of using the cloudadmin user to connect services to vCenter, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
28+
Instead of using the cloudadmin user to connect services to vCenter Server, we recommend individual accounts for each service. For more information about setting up separate accounts for connected services, see [Access and Identity Concepts](./concepts-identity.md).
2929

3030
## Reset your vCenter Server credentials
3131

@@ -48,7 +48,7 @@ To begin using Azure CLI:
4848

4949
1. In your Azure VMware Solution private cloud, open an Azure Cloud Shell session.
5050

51-
2. Update your vCenter *CloudAdmin* credentials. Remember to replace **{SubscriptionID}**, **{ResourceGroup}**, and **{PrivateCloudName}** with your private cloud information.
51+
2. Update your vCenter Server *CloudAdmin* credentials. Remember to replace **{SubscriptionID}**, **{ResourceGroup}**, and **{PrivateCloudName}** with your private cloud information.
5252

5353
```azurecli-interactive
5454
az resource invoke-action --action rotateVcenterPassword --ids "/subscriptions/{SubscriptionID}/resourceGroups/{ResourceGroup}/providers/Microsoft.AVS/privateClouds/{PrivateCloudName}" --api-version "2020-07-17-preview"

0 commit comments

Comments
 (0)