Skip to content

Commit c9f58c5

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 14b2803 + afd758c commit c9f58c5

16 files changed

+174
-43
lines changed

articles/azure-arc/data/upgrade-data-controller-direct-cli.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Upgrade direct mode Azure Arc data controller using the CLI
2+
title: Upgrade directly connected Azure Arc data controller using the CLI
33
description: Article describes how to upgrade a directly connected Azure Arc data controller using the CLI
44
services: azure-arc
55
ms.service: azure-arc
@@ -11,13 +11,15 @@ ms.date: 12/10/2021
1111
ms.topic: how-to
1212
---
1313

14-
# Upgrade direct mode Azure Arc data controller using the CLI
14+
# Upgrade a directly connected Azure Arc data controller using the CLI
1515

1616
This article describes how to upgrade a directly connected Azure Arc-enabled data controller using the Azure CLI (`az`).
1717

18+
During a data controller upgrade, portions of the data control plane such as Custom Resource Definitions (CRDs) and containers may be upgraded. An upgrade of the data controller will not cause downtime for the data services (SQL Managed Instance or PostgreSQL Hyperscale server).
19+
1820
## Prerequisites
1921

20-
You will need a direct mode data controller with the imageTag v1.0.0_2021-07-30 or later.
22+
You will need a directly connected data controller with the imageTag v1.0.0_2021-07-30 or later.
2123

2224
To check the version, run:
2325

@@ -52,15 +54,15 @@ v1.0.0_2021-07-30
5254

5355
## Upgrade data controller
5456

55-
This section shows how to upgrade a data controller in direct mode.
57+
This section shows how to upgrade a directly connected data controller.
5658

5759
> [!NOTE]
5860
> Some of the data services tiers and modes are generally available and some are in preview.
5961
> If you install GA and preview services on the same data controller, you can't upgrade in place.
6062
> To upgrade, delete all non-GA database instances. You can find the list of generally available
6163
> and preview services in the [Release Notes](./release-notes.md).
6264
63-
### Direct mode
65+
### Upgrade
6466

6567
You will need to connect and authenticate to a Kubernetes cluster and have an existing Kubernetes context selected prior to beginning the upgrade of the Azure Arc data controller.
6668

articles/azure-arc/data/upgrade-data-controller-indirect-cli.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Upgrade indirect mode Azure Arc data controller using the CLI
3-
description: Upgrade indirect mode Azure Arc data controller using the CLI
2+
title: Upgrade indirectly connected Azure Arc data controller using the CLI
3+
description: Article describes how to upgrade an indirectly connected Azure Arc data controller using the CLI
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
@@ -11,16 +11,15 @@ ms.date: 11/03/2021
1111
ms.topic: how-to
1212
---
1313

14-
# Upgrade indirect mode Azure Arc data controller using the CLI
14+
# Upgrade an indirectly connected Azure Arc data controller using the CLI
1515

1616
This article describes how to upgrade an indirectly connected Azure Arc-enabled data controller using the Azure CLI (`az`).
1717

18-
> [!IMPORTANT]
19-
> This article does not apply to a directly connected Azure Arc-enabled data controller. For the latest information about how to upgrade a directly connected data controller, see the [release notes](./release-notes.md#data-controller-upgrade).
18+
During a data controller upgrade, portions of the data control plane such as Custom Resource Definitions (CRDs) and containers may be upgraded. An upgrade of the data controller will not cause downtime for the data services (SQL Managed Instance or PostgreSQL Hyperscale server).
2019

2120
## Prerequisites
2221

23-
You will need an indirect mode data controller with the imageTag v1.0.0_2021-07-30 or later.
22+
You will need an indirectly connected data controller with the imageTag v1.0.0_2021-07-30 or later.
2423

2524
To check the version, run:
2625

@@ -55,15 +54,15 @@ v1.0.0_2021-07-30
5554

5655
## Upgrade data controller
5756

58-
This section shows how to upgrade a data controller in indirect mode.
57+
This section shows how to upgrade an indirectly connected data controller.
5958

6059
> [!NOTE]
6160
> Some of the data services tiers and modes are generally available and some are in preview.
6261
> If you install GA and preview services on the same data controller, you can't upgrade in place.
6362
> To upgrade, delete all non-GA database instances. You can find the list of generally available
6463
> and preview services in the [Release Notes](./release-notes.md).
6564
66-
### Indirect mode
65+
### Upgrade
6766

6867
You will need to connect and authenticate to a Kubernetes cluster and have an existing Kubernetes context selected prior to beginning the upgrade of the Azure Arc data controller.
6968

articles/azure-arc/data/upgrade-data-controller-indirect-kubernetes-tools.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Upgrade indirect mode Azure Arc data controller using Kubernetes tools
3-
description: Article explains how to upgrade indirect mode Azure Arc data controller using Kubernetes tools
2+
title: Upgrade indirectly connected Azure Arc data controller using Kubernetes tools
3+
description: Article describes how to upgrade an indirectly connected Azure Arc data controller using Kubernetes tools
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
@@ -11,7 +11,7 @@ ms.date: 12/09/2021
1111
ms.topic: how-to
1212
---
1313

14-
# Upgrade indirect mode Azure Arc data controller using Kubernetes tools
14+
# Upgrade an indirectly connected Azure Arc data controller using Kubernetes tools
1515

1616
This article explains how to upgrade an indirectly connected Azure Arc-enabled data controller with Kubernetes tools.
1717

articles/azure-arc/data/upgrade-sql-managed-instance-cli.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Upgrade an indirect mode Azure Arc-enabled Managed Instance using the CLI
3-
description: Upgrade an indirect mode Azure Arc-enabled Managed Instance using the CLI
2+
title: Upgrade an an indirectly connected Azure Arc-enabled Managed Instance using the CLI
3+
description: Article describes how to upgrade an indirectly connected Azure Arc-enabled Managed Instance using the CLI
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
@@ -11,7 +11,9 @@ ms.date: 11/03/2021
1111
ms.topic: how-to
1212
---
1313

14-
# Upgrade an indirect mode Azure Arc-enabled Managed Instance using the CLI
14+
# Upgrade an indirectly connected Azure Arc-enabled Managed Instance using the CLI
15+
16+
This article describes how to upgrade a SQL Managed Instance deployed on an indirectly connected Azure Arc-enabled data controller using the Azure CLI (`az`).
1517

1618
## Prerequisites
1719

@@ -45,6 +47,8 @@ Preparing to upgrade sql sqlmi-1 in namespace arc to data controller version.
4547

4648
### General Purpose
4749

50+
During a SQL Managed Instance General Purpose upgrade, the containers in the pod will be upgraded and will be reprovisioned. This will cause a short amount of downtime as the new pod is created. You will need to build resiliency into your application, such as connection retry logic, to ensure minimal disruption. Read [Overview of the reliability pillar](/azure/architecture/framework/resiliency/overview) for more information on architecting resiliency.
51+
4852
To upgrade the Managed Instance, use the following command:
4953

5054
````cli

articles/azure-arc/data/upgrade-sql-managed-instance-direct-cli.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Upgrade a direct mode Azure Arc-enabled Managed Instance using the CLI
3-
description: Article describes how to upgrade a direct mode Azure Arc-enabled Managed Instance using the CLI
2+
title: Upgrade a directly connected Azure Arc-enabled Managed Instance using the CLI
3+
description: Article describes how to upgrade a directly connected Azure Arc-enabled Managed Instance using the CLI
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
@@ -11,7 +11,7 @@ ms.date: 11/10/2021
1111
ms.topic: how-to
1212
---
1313

14-
# Upgrade a direct mode Azure Arc-enabled Managed Instance using the CLI
14+
# Upgrade a directly connected Azure Arc-enabled Managed Instance using the CLI
1515

1616
This article describes how to upgrade a SQL Managed Instance deployed on a directly connected Azure Arc-enabled data controller using the Azure CLI (`az`).
1717

@@ -47,6 +47,8 @@ Preparing to upgrade sql sqlmi-1 in namespace arc to data controller version.
4747

4848
### General Purpose
4949

50+
During a SQL Managed Instance General Purpose upgrade, the containers in the pod will be upgraded and will be reprovisioned. This will cause a short amount of downtime as the new pod is created. You will need to build resiliency into your application, such as connection retry logic, to ensure minimal disruption. Read [Overview of the reliability pillar](/azure/architecture/framework/resiliency/overview) for more information on architecting resiliency.
51+
5052
To upgrade the Managed Instance, use the following command:
5153

5254
````cli

articles/azure-arc/data/upgrade-sql-managed-instance-indirect-kubernetes-tools.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Upgrade indirect mode Azure Arc-enabled Managed Instance - Kubernetes
3-
description: Describes how to upgrade indirect mode Azure Arc-enabled Managed Instance using Kubernetes
2+
title: Upgrade an indirectly connected Azure Arc-enabled Managed Instance using Kubernetes tools
3+
description: Article describes how to upgrade an indirectly connected Azure Arc-enabled Managed Instance using Kubernetes tools
44
services: azure-arc
55
ms.service: azure-arc
66
ms.subservice: azure-arc-data
@@ -11,10 +11,9 @@ ms.date: 11/08/2021
1111
ms.topic: how-to
1212
---
1313

14-
# Upgrade an indirect mode Azure Arc-enabled Managed Instance using Kubernetes tools
15-
16-
This article describes how to upgrade a SQL Managed Instance deployed on a directly connected Azure Arc-enabled data controller using Kubernetes tools.
14+
# Upgrade an an indirectly connected Azure Arc-enabled Managed Instance using Kubernetes tools
1715

16+
This article describes how to upgrade a SQL Managed Instance deployed on an indirectly connected Azure Arc-enabled data controller using Kubernetes tools.
1817

1918
## Prerequisites
2019

@@ -25,7 +24,7 @@ Before you can proceed with the tasks in this article you need:
2524
- To connect and authenticate to a Kubernetes cluster
2625
- An existing Kubernetes context selected
2726

28-
You need an indirect mode data controller with the `imageTag v1.0.0_2021-07-30` or greater.
27+
You need an an indirectly connected data controller with the `imageTag v1.0.0_2021-07-30` or greater.
2928

3029
## Limitations
3130

articles/azure-monitor/logs/logs-data-export.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,10 +78,10 @@ You need to have 'write' permissions to both workspace and destination to config
7878

7979
Don't use an existing event hub that has other, non-monitoring data stored in it to better control access to the data and prevent reaching event hub namespace ingress rate limit, failures, and latency.
8080

81-
Data is sent to your event hub as it reaches Azure Monitor and exported to destinations located in workspace region. When specific event hub isn't provided in rule, an event hub is created for each data type that you export with the name *am-* followed by the name of the table. For example, the table *SecurityEvent* would sent to an event hub named *am-SecurityEvent*. The [number of supported event hubs in 'Basic' and 'Standard' namespaces tiers is 10](../../event-hubs/event-hubs-quotas.md#common-limits-for-all-tiers). When exporting more than 10 tables to these tiers, either split the tables between several export rules to different event hub namespaces, or provide an event hub name in the rule to export all tables to that event hub.
81+
Data is sent to your event hub as it reaches Azure Monitor and exported to destinations located in workspace region. You can create multiple export rules to the same event hub namespace by providing different `event hub name` in rule.When `event hub name` isn't provided, a default event hub is created for each table that you export with the name *am-* followed by the name of the table. For example, the table *SecurityEvent* would sent to an event hub named *am-SecurityEvent*. The [number of supported event hubs in 'Basic' and 'Standard' namespaces tiers is 10](../../event-hubs/event-hubs-quotas.md#common-limits-for-all-tiers). When exporting more than 10 tables to these tiers, either split the tables between several export rules to different event hub namespaces, or provide an event hub name in the rule to export all tables to that event hub.
8282

8383
> [!NOTE]
84-
> - 'Basic' event hub tier is limited--it supports lower event size [limit](../../event-hubs/event-hubs-quotas.md#basic-vs-standard-vs-premium-vs-dedicated-tiers) and no the is no [Auto-inflate](../../event-hubs/event-hubs-auto-inflate.md) option. Since data volume to your workspace increases over time and consequence event hub scaling is required, use 'Standard', 'Premium' or 'Dedicated' event hub tiers with **Auto-inflate** feature enabled to automatically scale up and increase the number of throughput units. See [Automatically scale up Azure Event Hubs throughput units](../../event-hubs/event-hubs-auto-inflate.md).
84+
> - 'Basic' event hub tier is limited--it supports [lower event size](../../event-hubs/event-hubs-quotas.md#basic-vs-standard-vs-premium-vs-dedicated-tiers) and no [Auto-inflate](../../event-hubs/event-hubs-auto-inflate.md) option to automatically scale up and increase the number of throughput units. Since data volume to your workspace increases over time and consequence event hub scaling is required, use 'Standard', 'Premium' or 'Dedicated' event hub tiers with **Auto-inflate** feature enabled. See [Automatically scale up Azure Event Hubs throughput units](../../event-hubs/event-hubs-auto-inflate.md).
8585
> - Data export can't reach event hub resources when virtual networks are enabled. You have to enable the **Allow trusted Microsoft services** to bypass this firewall setting in event hub, to grant access to your Event Hubs resources.
8686
8787
## Enable data export

articles/cost-management-billing/costs/quick-create-budget-template.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ One Azure resource is defined in the template:
9494

9595
2. Select or enter the following values.
9696

97-
:::image type="content" source="./media/quick-create-budget-template/create-budget-simple-image.png" alt-text="Resource Manager template, Create budget without a filter, deploy portal]" lightbox="./media/quick-create-budget-template/create-budget-simple-image.png" :::
97+
:::image type="content" source="./media/quick-create-budget-template/create-budget-simple-image.png" alt-text="Resource Manager template, Create budget without a filter, deploy portal." lightbox="./media/quick-create-budget-template/create-budget-simple-image.png" :::
9898

9999
* **Subscription**: select an Azure subscription.
100100
* **Resource group**: if required, select an existing resource group, or **Create new**.
@@ -114,7 +114,7 @@ One Azure resource is defined in the template:
114114

115115
4. If you selected **Review + create**, your template is validated. Select **Create**.
116116

117-
![Resource Manager template, budget no filters, deploy portal notification](./media/quick-create-budget-template/resource-manager-template-portal-deployment-notification.png)
117+
![Resource Manager template, budget no filters, deploy portal notification.](./media/quick-create-budget-template/resource-manager-template-portal-deployment-notification.png)
118118

119119
The Azure portal is used to deploy the template. In addition to the Azure portal, you can also use Azure PowerShell, Azure CLI, and REST API. To learn about other deployment templates, see [Deploy templates](../../azure-resource-manager/templates/deploy-powershell.md).
120120

articles/iot-edge/how-to-connect-downstream-iot-edge-device.md

Lines changed: 54 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to configure an IoT Edge device to connect to Azure IoT Edge ga
44
author: kgremban
55

66
ms.author: kgremban
7-
ms.date: 03/01/2021
7+
ms.date: 01/09/2022
88
ms.topic: conceptual
99
ms.service: iot-edge
1010
services: iot-edge
@@ -532,8 +532,60 @@ The API proxy module was designed to be customized to handle most common gateway
532532
1. Select **Review + create** to go to the final step.
533533
1. Select **Create** to deploy to your device.
534534
535+
## Integrate Microsoft Defender for IoT with IoT Edge gateway
536+
537+
Leaf devices can be used to integrate the Microsoft Defender for IoT's micro agent with the IoT Edge gateway using leaf device proxying.
538+
539+
Learn more about the [Defender for IoT micro agent](../defender-for-iot/device-builders/overview.md#defender-for-iot-micro-agent).
540+
541+
**To integrate Microsoft Defender for IoT with IoT Edge using leaf device proxying**:
542+
543+
1. Sign in to the Azure portal.
544+
545+
1. Navigate to **IoT Hub** > **`Your Hub`** > **Device management** > **Devices**
546+
547+
1. Select your device.
548+
549+
:::image type="content" source="media/how-to-connect-downstream-iot-edge-device/select-device.png" alt-text="Screenshot showing where your device is located for selection.":::
550+
551+
1. Select the `DefenderIotMicroAgent` module twin that you created from [these instructions](../defender-for-iot/device-builders/quickstart-create-micro-agent-module-twin.md#create-defenderiotmicroagent-module-twin).
552+
553+
:::image type="content" source="media/how-to-connect-downstream-iot-edge-device/defender-micro-agent.png" alt-text="Screenshot showing the location of the DefenderIotMicroAgent.":::
554+
555+
1. Select the :::image type="icon" source="media/how-to-connect-downstream-iot-edge-device/copy-icon.png" border="false"::: button to copy your Connection string (primary key).
556+
557+
1. Paste the Connection string into a text editing application, and add the GatewayHostName to the string. For example, `HostName=nested11.azure-devices.net;DeviceId=leaf1;ModuleId=module1;SharedAccessKey=xxx;GatewayHostName=10.16.7.4`.
558+
559+
1. Open a terminal on the leaf device.
560+
561+
1. Use the following command to place the connection string encoded in utf-8 in the Defender for Cloud agent directory into the file `connection_string.txt` in the following path: `/var/defender_iot_micro_agent/connection_string.txt`:
562+
563+
```bash
564+
sudo bash -c 'echo "<connection string>" > /var/defender_iot_micro_agent/connection_string.txt'
565+
```
566+
567+
The `connection_string.txt` should now be located in the following path location `/var/defender_iot_micro_agent/connection_string.txt`.
568+
569+
1. Restart the service using this command:
570+
571+
```bash
572+
sudo systemctl restart defender-iot-micro-agent.service
573+
```
574+
575+
1. Navigate back to the device.
576+
577+
:::image type="content" source="media/how-to-connect-downstream-iot-edge-device/device.png" alt-text="Screenshot showing how to navigate back to your device.":::
578+
579+
1. Enable the connection to the IoT Hub, and select the gear icon.
580+
581+
:::image type="content" source="media/how-to-connect-downstream-iot-edge-device/gear-icon.png" alt-text="Screenshot showing what to select to set a parent device.":::
582+
583+
1. Select the parent device from the displayed list.
584+
585+
1. Ensure that port 8883 (MQTT) between the leaf device and the IoT Edge device is open.
586+
535587
## Next steps
536588
537589
[How an IoT Edge device can be used as a gateway](iot-edge-as-gateway.md)
538590
539-
[Configure the API proxy module for your gateway hierarchy scenario](how-to-configure-api-proxy-module.md)
591+
[Configure the API proxy module for your gateway hierarchy scenario](how-to-configure-api-proxy-module.md)
1.06 KB
Loading

0 commit comments

Comments
 (0)