You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/automation/change-tracking/enable-vms-monitoring-agent.md
+19-3Lines changed: 19 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Enable Azure Automation Change Tracking for single machine and multiple m
3
3
description: This article tells how to enable the Change Tracking feature for single machine and multiple machines at scale from the Azure portal.
4
4
services: automation
5
5
ms.subservice: change-inventory-management
6
-
ms.date: 09/09/2024
6
+
ms.date: 10/10/2024
7
7
ms.topic: how-to
8
8
ms.service: azure-automation
9
9
---
@@ -41,6 +41,8 @@ This section provides detailed procedure on how you can enable change tracking o
41
41
42
42
:::image type="content" source="media/enable-vms-monitoring-agent/deployment-success-inline.png" alt-text="Screenshot showing the notification of deployment." lightbox="media/enable-vms-monitoring-agent/deployment-success-expanded.png":::
43
43
44
+
> [!NOTE]
45
+
> It usually takes up to two to three minutes to successfully onboard and enable the virtual machine(s). After you enable a virtual machine for change tracking, you can make changes to the files, registries, or software for the specific VM.
@@ -66,6 +68,22 @@ This section provides detailed procedure on how you can enable change tracking o
66
68
1. Select **Enable** to initiate the deployment.
67
69
1. A notification appears on the top right corner of the screen indicating the status of deployment.
68
70
71
+
72
+
#### [Single Azure Arc VM - portal](#tab/singlearcvm)
73
+
74
+
1. Sign in to [Azure portal](https://portal.azure.com). Search for and select **Machines-Azure Arc**.
75
+
76
+
:::image type="content" source="media/enable-vms-monitoring-agent/select-arc-machines-portal.png" alt-text="Screenshot showing how to select Azure Arc machines from the portal." lightbox="media/enable-vms-monitoring-agent/select-arc-machines-portal.png":::
77
+
78
+
1. Select the Azure-Arc machine for which you want to enable Change Tracking.
79
+
1. Under **Operations**, select **Change tracking** to view the change tracking and inventory page.
80
+
1. In the **Stay up-to-date with all changes** layout, select **Enable using AMA agent (Recommended)** option and **Enable**.
81
+
82
+
:::image type="content" source="media/enable-vms-monitoring-agent/select-change-tracking-arc-vm.png" alt-text="Screenshot showing to select change tracking option for a single Azure arc virtual machine from the portal." lightbox="media/enable-vms-monitoring-agent/select-change-tracking-arc-vm.png":::
83
+
84
+
It will initiate the deployment and the notification appears on the top right corner of the screen.
85
+
86
+
69
87
#### [Arc-enabled VMs - portal/CLI](#tab/arcvms)
70
88
71
89
To enable the Change Tracking and Inventory on Arc-enabled servers, ensure that the custom Change Tracking Data collection rule is associated to the Arc-enabled VMs.
@@ -101,8 +119,6 @@ Follow these steps to associate the data collection rule to the Arc-enabled VMs:
101
119
```
102
120
---
103
121
104
-
>[!NOTE]
105
-
>It usually takes up to two to three minutes to successfully onboard and enable the virtual machine(s). After you enable a virtual machine for change tracking, you can make changes to the files, registries, or software for the specific VM.
106
122
107
123
## Enable Change Tracking at scale using Azure Monitoring Agent
Copy file name to clipboardExpand all lines: articles/automation/change-tracking/guidance-migration-log-analytics-monitoring-agent.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: snehasudhirG
5
5
services: automation
6
6
ms.subservice: change-inventory-management
7
7
ms.topic: how-to
8
-
ms.date: 09/27/2024
8
+
ms.date: 10/10/2024
9
9
ms.author: sudhirsneha
10
10
ms.custom:
11
11
ms.service: azure-automation
@@ -29,10 +29,7 @@ Using the Azure portal, you can migrate from Change Tracking & Inventory with LA
29
29
30
30
## Onboarding to Change tracking and inventory using Azure Monitoring Agent
31
31
32
-
### [Using Azure portal - Azure single VM](#tab/ct-single-vm)
33
-
34
-
> [!NOTE]
35
-
> To onboard Arc-enabled VMs, use the PowerShell Script. For more information, see the steps listed in tab Using PowerShell script - Arc-enabled VMs.
32
+
### [Single Azure VM - Azure portal](#tab/ct-single-vm)
36
33
37
34
To onboard through Azure portal, follow these steps:
38
35
@@ -46,14 +43,14 @@ To onboard through Azure portal, follow these steps:
46
43
47
44
:::image type="content" source="media/guidance-migration-log-analytics-monitoring-agent/switch-versions-inline.png" alt-text="Screenshot that shows switching between log analytics and Azure Monitoring Agent after a successful migration." lightbox="media/guidance-migration-log-analytics-monitoring-agent/switch-versions-expanded.png":::
1. Sign in to [Azure portal](https://portal.azure.com) and select your Automation account.
52
49
1. Under **Configuration Management**, select **Change tracking** and then select **Configure with AMA**.
53
50
54
51
:::image type="content" source="media/guidance-migration-log-analytics-monitoring-agent/onboarding-at-scale-inline.png" alt-text="Screenshot of onboarding at scale to Change tracking and inventory using Azure monitoring agent." lightbox="media/guidance-migration-log-analytics-monitoring-agent/onboarding-at-scale-expanded.png":::
55
52
56
-
1. On the **Onboarding to Change Tracking with Azure Monitoring** page, you can view your automation account and list of machines that are currently on Log Analytics and ready to be onboarded to Azure Monitoring Agent of Change Tracking and inventory.
53
+
1. On the **Onboarding to Change Tracking with Azure Monitoring** page, you can view your automation account and list of both Azure and Azure Arc machines that are currently on Log Analytics and ready to be onboarded to Azure Monitoring Agent of Change Tracking and inventory.
57
54
58
55
:::image type="content" source="media/guidance-migration-log-analytics-monitoring-agent/onboarding-from-log-analytics-inline.png" alt-text="Screenshot of onboarding multiple virtual machines to Change tracking and inventory from log analytics to Azure monitoring agent." lightbox="media/guidance-migration-log-analytics-monitoring-agent/onboarding-from-log-analytics-expanded.png":::
59
56
@@ -69,7 +66,21 @@ To onboard through Azure portal, follow these steps:
69
66
70
67
:::image type="content" source="media/guidance-migration-log-analytics-monitoring-agent/switch-versions-inline.png" alt-text="Screenshot that shows switching between log analytics and Azure Monitoring Agent after a successful migration." lightbox="media/guidance-migration-log-analytics-monitoring-agent/switch-versions-expanded.png":::
### [Single Azure Arc VM - Azure portal](#tab/ct-single-arcvm)
70
+
71
+
1. Sign in to the [Azure portal](https://portal.azure.com). Search for and select **Machines-Azure Arc**.
72
+
73
+
:::image type="content" source="media/enable-vms-monitoring-agent/select-arc-machines-portal.png" alt-text="Screenshot showing how to select Azure Arc machines from the portal." lightbox="media/enable-vms-monitoring-agent/select-arc-machines-portal.png":::
74
+
75
+
1. Select the specific Arc machine with Change Tracking V1 enabled that needs to be migrated to Change Tracking V2.
76
+
77
+
1. Select **Migrate to Change Tracking with AMA** and in the **Configure with Azure monitor agent**, provide the resource id in the **Log analytics workspace** and select **Migrate** to initiate the deployment.
78
+
79
+
:::image type="content" source="media/guidance-migration-log-analytics-monitoring-agent/onboarding-single-arc-vm.png" alt-text="Screenshot of onboarding a single Arc VM to Change tracking and inventory using Azure monitoring agent." lightbox="media/guidance-migration-log-analytics-monitoring-agent/onboarding-single-arc-vm.png":::
80
+
81
+
1. Select **Manage Activity log connection** to evaluate the incoming events and logs across LA agent and AMA version.
@@ -173,7 +184,7 @@ To obtain the Log Analytics Workspace resource ID, follow these steps:
173
184
### [Using PowerShell script](#tab/limit-policy)
174
185
175
186
1. For File Content changes-based settings, you must migrate manually from LA version to AMA version of Change Tracking & Inventory. Follow the guidance listed in [Track file contents](manage-change-tracking.md#track-file-contents).
176
-
1. Any VM with > 100 file/registry settings for migration via Azure Portal isn't supported.
187
+
1. Any VM with > 100 file/registry settings for migration via Azure portal isn't supported.
177
188
1. Alerts that you configure using the Log Analytics Workspace must be [manually configured](configure-alerts.md).
#Customer intent: As a developer, I need to know how to use the Azure Developer CLI to create and deploy my function code securely to a new function app in the Flex Consumption plan in Azure by using azd templates and the azd up command.
@@ -249,19 +249,26 @@ py -m venv .venv
249
249
250
250
1. Run this command from your app folder in a terminal or command prompt:
251
251
252
-
::: zone pivot="programming-language-csharp, programming-language-powershell,programming-language-python,programming-language-javascript"
252
+
::: zone pivot="programming-language-csharp, programming-language-powershell,programming-language-python"
253
253
```console
254
254
func start
255
255
```
256
256
::: zone-end
257
-
::: zone pivot="programming-language-java"
257
+
::: zone pivot="programming-language-java"
258
258
```console
259
259
mvn clean package
260
260
mvn azure-functions:run
261
261
```
262
262
::: zone-end
263
-
::: zone pivot="programming-language-typescript"
263
+
::: zone pivot="programming-language-javascript"
264
264
```console
265
+
npm install
266
+
func start
267
+
```
268
+
::: zone-end
269
+
::: zone pivot="programming-language-typescript"
270
+
```console
271
+
npm install
265
272
npm start
266
273
```
267
274
::: zone-end
@@ -273,11 +280,16 @@ py -m venv .venv
273
280
<http://localhost:7071/api/httpget>
274
281
275
282
1. From a new terminal or command prompt window, run this `curl` command to send a POST request with a JSON payload to the `httppost` endpoint:
276
-
283
+
::: zone pivot="programming-language-csharp, programming-language-powershell,programming-language-python"
This command reads JSON payload data from the `testdata.json` project file. You can find examples of both HTTP requests in the `test.http` project file.
282
294
283
295
1. When you're done, press Ctrl+C in the terminal window to stop the `func.exe` host process.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-vm-backup-faq.yml
+28-2Lines changed: 28 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ metadata:
4
4
description: In this article, discover answers to common questions about backing up Azure VMs with the Azure Backup service.
5
5
ms.topic: faq
6
6
ms.service: azure-backup
7
-
ms.date: 09/10/2024
7
+
ms.date: 10/21/2024
8
8
author: AbhishekMallick-MS
9
9
ms.author: v-abhmallick
10
10
@@ -296,7 +296,7 @@ sections:
296
296
answer: |
297
297
Yes, it's supported for [Cross Zonal Restore](backup-azure-arm-restore-vms.md#restore-options).
298
298
299
-
- question: How do I clear iSCSI session and it's processes after running the Python script for Linux ILR?
299
+
- question: How do I clear iSCSI session and its processes after running the Python script for Linux ILR?
300
300
answer: |
301
301
After you unmount disks from the Azure portal, run the Python script with `clean` parameter (`python scriptName.py clean`) to clear the session and remove the mount paths of the recovery point from the machine.
302
302
@@ -404,5 +404,31 @@ sections:
404
404
answer: |
405
405
The expiry time for the latest recovery point doesn't appear because it has infinite retention until a newer one gets created. The expiry time of other recovery points will be available in the Azure Portal after 24 hours of creation, depending on when the garbage collection runs (that will be within 24 hours).
406
406
407
+
- question: Will an Azure VM restore operation to original or alternate location affect a scheduled backup?
408
+
answer: |
409
+
No, the restore operation (to the original or an alternate location) doesn't affect scheduled backups.
410
+
411
+
- **Restore to Original Location**: Azure Backup replaces the existing VM’s disks with the ones from the restore point. This process includes [taking a snapshot of the current VM before the restore ensuring that the backup schedule remains](backup-azure-arm-restore-vms.md).
412
+
- **Restore to Alternate Location**: Azure Backup creates a new VM using the restore point. This new VM won't have the same backup schedule as the original VM; you need to configure the Backup policy manually. Learn [about Azure VM restore](about-azure-vm-restore.md).
407
413
414
+
In these restore scenarios, the original backup policy and schedule for the original VM remain unaffected. However, if you want the restored VM (in the alternate location) to have a backup schedule, you need to set up the Backup policy.
408
415
416
+
- question: What happens to the backup configuration if I do Original/Alternate Location Restore of Azure VMs?
417
+
answer: |
418
+
In case of an Original Location Restore (OLR) or an Alternate Location Restore (ALR) for Azure VMs, Azure Backup performs the backup configuration as:
419
+
420
+
| Restore type | Backup configuration | Backup data |
421
+
| --- | --- | --- |
422
+
| **Original Location Restore (OLR)** | The backup configuration remains the same. The restored VM uses the same backup policy and schedule as the original VM. | The existing backup data is preserved, and new backups are triggered as per the original backup schedule. |
423
+
| **Alternate Location Restore (ALR)** | The new VM created in the alternate location doesn't inherit the backup configuration of the original VM. You need to configure a new backup policy for this VM manually. | The backup data for the original VM remains unaffected. However, the new VM starts with a fresh backup history once you configure its backup. |
424
+
425
+
>[!Note]
426
+
>- **OLR**: Provides a seamless continuation of backups with the same policy.
427
+
>- **ALR**: Requires manual setup of backup policies for the new VM.
428
+
429
+
- question: Why VMs with the Storage Spaces direct and Storage Spaces are not supported with the Azure VM Backup?
430
+
answer: |
431
+
Storage Spaces Direct is not supported since it has data spread across two different virtual machines.
432
+
433
+
Storage spaces in a single VM not supported for application consistent VM backup. For application consistent VM backup, VSS freezes the I/O and ensures that disk snapshots are consistent. Storage Spaces can still perform writes in the background, breaking the application consistent guarantee. This can result in a small probability that the backup taken is not application consistent. Today, backup and recovery of VM with storage spaces is not blocked in the product.
- Resolved issue with MDM Init container which caused container to crash in event it couldn't be pulled
233
+
- Added support for [Logic Apps Hybrid Deployment Model (Public Preview)](https://techcommunity.microsoft.com/t5/azure-integration-services-blog/announcement-introducing-the-logic-apps-hybrid-deployment-model/ba-p/4271568)
234
+
230
235
## Next steps
231
236
232
237
[Create a Container Apps connected environment (Preview)](azure-arc-enable-cluster.md)
Copy file name to clipboardExpand all lines: articles/iot-central/core/concepts-device-authentication.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,6 +27,8 @@ This article describes the following device authentication options:
27
27
-[SAS enrollment group](#sas-enrollment-group)
28
28
-[Individual enrollment](#individual-enrollment)
29
29
30
+
Each of these authentication options requires that each device has a unique device ID. The device ID is a unique identifier for the device that you use to manage the device in your IoT Central application.
31
+
30
32
## X.509 enrollment group
31
33
32
34
In a production environment, using X.509 certificates is the recommended device authentication mechanism for IoT Central. To learn more, see [Device Authentication using X.509 CA Certificates](../../iot-hub/iot-hub-x509ca-overview.md).
@@ -68,6 +70,9 @@ To connect a device with device SAS token to your application:
68
70
az iot central device compute-device-key --primary-key <enrollment group primary key> --device-id <device ID>
69
71
```
70
72
73
+
> [!TIP]
74
+
> Each device that connects to your IoT Central application must have a unique device ID. The previous command generates a unique token for each device.
75
+
71
76
1. Use the generated device token when the device connects to your IoT Central application.
0 commit comments