You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-functions/durable/durable-functions-sub-orchestrations.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,10 +13,10 @@ In addition to calling activity functions, orchestrator functions can call other
13
13
14
14
An orchestrator function can call another orchestrator function using the *"call-sub-orchestrator"* API. The [Error Handling & Compensation](durable-functions-error-handling.md#automatic-retry-on-failure) article has more information on automatic retry.
15
15
16
-
Sub-orchestrator functions behave just like activity functions from the caller's perspective. They can return a value, throw an exception, and can be awaited by the parent orchestrator function.
16
+
Sub-orchestrator functions behave just like activity functions from the caller's perspective. They can return a value and throw an exception as the parent orchestrator function anticipates them.
17
17
18
18
> [!NOTE]
19
-
> Sub-orchestrations are not yet supported in PowerShell.
19
+
> Sub-orchestrations aren't yet supported in PowerShell.
@@ -151,7 +151,7 @@ public void deviceProvisioningOrchestration(
151
151
152
152
This orchestrator function can be used as-is for one-off device provisioning or it can be part of a larger orchestration. In the latter case, the parent orchestrator function can schedule instances of `DeviceProvisioningOrchestration` using the *"call-sub-orchestrator"* API.
153
153
154
-
Here is an example that shows how to run multiple orchestrator functions in parallel.
154
+
The following example shows how to run multiple orchestrator functions at the same time:
Copy file name to clipboardExpand all lines: articles/cyclecloud/how-to/terminate-cluster.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,13 @@ ms.author: adjohnso
8
8
9
9
# Terminate a Cluster
10
10
11
-
You can terminate a cluster when it has completed all the submitted jobs and the cluster is no longer needed. Terminating the cluster will stop and remove the virtual machines and delete any non-persistent volumes in the cluster. Nodes that originate from a nodearray are removed, while other nodes remain in the cluster in the `Off` state.
11
+
You can terminate a cluster when it completes all jobs submitted and the cluster isn't needed. Terminating the cluster stops and removes virtual machines and delete any nonpersistent volumes in the cluster. Nodes that originate from a nodearray are removed, while other nodes remain in the cluster in the `Off` state.
12
12
13
-
Terminating is an orchestration process. Cluster nodes will move into the `Terminating` state and then to `Off` if the termination was successful. If there is an error during the process, that node will be marked as `Failed` and can be retried.
13
+
Terminating is an orchestration process where cluster nodes move into the `Terminating` state and then to `Off` if the termination succeeds. If there's an error during the process, that node is marked as `Failed` and can be retried.
14
14
15
15
## Terminate via CycleCloud GUI
16
16
17
-
Click**Terminate** in the CycleCloud GUI to shut down all of the cluster's infrastructure. All underlying Azure resources will be cleaned up as part of the cluster termination, which may take several minutes.
17
+
Select**Terminate** in the CycleCloud GUI to shut down the cluster's infrastructure. All underlying Azure resources are cleaned up as part of the cluster termination, which can take several minutes.
To remove the resources no longer needed, you can simply delete the resource group. Everything within that group will be cleaned up as part of the process:
37
+
To remove the resources that aren't needed, you can delete the resource group and everything within it:
38
38
39
39
```azurecli-interactive
40
40
az group delete --name "{RESOURCE GROUP}"
41
41
```
42
42
43
43
::: moniker range=">=cyclecloud-8"
44
-
## Force-Delete VMs
45
44
46
-
CycleCloud 8.2.1 supports the **Force Delete** option for VMs, which can provide faster delete times at the risk of possible data loss on the disks. This can be enabled separately for standalone VMs (such as scheduler head nodes) or scaleset VMs (execute nodes). To enable it, go to the **Settings** page in the upper right corner, and **Configure CycleCloud**.
45
+
## Force-Delete Virtual Machines
46
+
47
+
CycleCloud 8.2.1 supports the **Force Delete** option for VMs, which can provide faster delete times at the risk of possible data loss on the disks. This feature can be enabled separately for standalone VMs (such as scheduler head nodes) or scaleset VMs (execute nodes). To enable it, go to the **Settings** page in the upper right corner, and **Configure CycleCloud**.
@@ -53,7 +54,7 @@ You can now move your SQL Server Integration Services (SSIS) projects, packages,
53
54
54
55
- when Azure-SSIS IR inside a virtual network
55
56
56
-
There is a special scenario when SQL Managed Instance is in a region that Azure-SSIS IR does not support, Azure-SSIS IR is inside a virtual network without VNet peering due to Global VNet peering limitation. In this scenario, **Azure-SSIS IR inside a virtual network** connects SQL Managed Instance **over public endpoint**. Use below Network Security Group(NSG) rules to allow traffic between SQL Managed Instance and Azure-SSIS IR:
57
+
There is a special scenario when SQL Managed Instance is in a region that Azure-SSIS IR doesn't support, Azure-SSIS IR is inside a virtual network without VNet peering due to Global VNet peering limitation. In this scenario, **Azure-SSIS IR inside a virtual network** connects SQL Managed Instance **over public endpoint**. Use the following Network Security Group(NSG) rules to allow traffic between SQL Managed Instance and Azure-SSIS IR:
57
58
58
59
1.**Inbound requirement of SQL Managed Instance**, to allow inbound traffic from Azure-SSIS IR.
59
60
@@ -83,15 +84,15 @@ You can now move your SQL Server Integration Services (SSIS) projects, packages,
83
84
- A network security group, with the name *\<Guid>-azurebatch-cloudservicenetworksecuritygroup
84
85
- An Azure public IP address, with the name -azurebatch-cloudservicepublicip
85
86
86
-
Those resources will be created when your Azure-SSIS IR starts. They'll be deleted when your Azure-SSIS IR stops. To avoid blocking your Azure-SSIS IR from stopping, don't reuse these network resources in your other resources.
87
+
Those resources are created when your Azure-SSIS IR starts. They're deleted when your Azure-SSIS IR stops. To avoid blocking your Azure-SSIS IR from stopping, don't reuse these network resources in your other resources.
87
88
88
-
1. Make sure that you have no [resource lock](../azure-resource-manager/management/lock-resources.md) on the resource group/subscription to which the virtual network belongs. If you configure a read-only/delete lock, starting and stopping your Azure-SSIS IR will fail, or it will stop responding.
89
+
1. Make sure that you have no [resource lock](../azure-resource-manager/management/lock-resources.md) on the resource group/subscription to which the virtual network belongs. If you configure a read-only/delete lock, starting and stopping your Azure-SSIS IR will fail or it'll stop responding.
89
90
90
91
1. Make sure that you don't have an Azure Policy definition that prevents the following resources from being created under the resource group/subscription to which the virtual network belongs:
91
92
- Microsoft.Network/LoadBalancers
92
93
- Microsoft.Network/NetworkSecurityGroups
93
94
94
-
1. Allow traffic on Network Security Group (NSG) rule, to allow traffic between SQL Managed Instance and Azure-SSIS IR, and traffic needed by Azure-SSIS IR.
95
+
1. Allow traffic on Network Security Group (NSG) rule to allow traffic between SQL Managed Instance and Azure-SSIS IR, and traffic needed by Azure-SSIS IR.
95
96
1.**Inbound requirement of SQL Managed Instance**, to allow inbound traffic from Azure-SSIS IR.
96
97
97
98
| Transport protocol | Source | Source port range | Destination | Destination port range | Comments |
@@ -113,7 +114,7 @@ You can now move your SQL Server Integration Services (SSIS) projects, packages,
113
114
| Transport protocol | Source | Source port range | Destination | Destination port range | Comments |
114
115
|---|---|---|---|---|---|
115
116
| TCP | BatchNodeManagement | * | VirtualNetwork | 29876, 29877 (if you join the IR to a Resource Manager virtual network) <br/><br/>10100, 20100, 30100 (if you join the IR to a classic virtual network)| The Data Factory service uses these ports to communicate with the nodes of your Azure-SSIS IR in the virtual network. <br/><br/> Whether or not you create a subnet-level NSG, Data Factory always configures an NSG at the level of the network interface cards (NICs) attached to the virtual machines that host the Azure-SSIS IR. Only inbound traffic from Data Factory IP addresses on the specified ports is allowed by that NIC-level NSG. Even if you open these ports to internet traffic at the subnet level, traffic from IP addresses that aren't Data Factory IP addresses is blocked at the NIC level. |
116
-
| TCP | CorpNetSaw | * | VirtualNetwork | 3389 | (Optional) This rule is only required when Microsoft supporter asks customer to open for advanced troubleshooting and can be closed right after troubleshooting. **CorpNetSaw** service tag permits only secure access workstations on the Microsoft corporate network to use remote desktop. And this service tag can't be selected from portal and is only available via Azure PowerShell or Azure CLI. <br/><br/> At NIC level NSG, port 3389 is open by default and we allow you to control port 3389 at subnet level NSG, meanwhile Azure-SSIS IR has disallowed port 3389 outbound by default at windows firewall rule on each IR node for protection. |
117
+
| TCP | CorpNetSaw | * | VirtualNetwork | 3389 | (Optional) This rule is only required when Microsoft supporter asks customer to open for advanced troubleshooting and can be closed right after troubleshooting. **CorpNetSaw** service tag permits only secure access workstations on the Microsoft corporate network to use remote desktop. And this service tag can't be selected from portal and is only available via Azure PowerShell or Azure CLI. <br/><br/> At NIC level NSG, port 3389 is open by default, and we allow you to control port 3389 at subnet level NSG. Meanwhile, Azure-SSIS IR has prevented port 3389 outbound by default at Windows Firewall rule on each IR node for protection. |
117
118
|||||||
118
119
119
120
1. See [virtual network configuration](azure-ssis-integration-runtime-virtual-network-configuration.md) for more info:
0 commit comments