Skip to content

Commit cfdd194

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 7ae31ae + 897d3cf commit cfdd194

33 files changed

+412
-217
lines changed

articles/active-directory-b2c/custom-domain.md

Lines changed: 95 additions & 117 deletions
Large diffs are not rendered by default.
139 KB
Loading
139 KB
Loading

articles/automanage/automanage-arc.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: automanage
55
ms.collection: linux
66
ms.workload: infrastructure
77
ms.topic: conceptual
8-
ms.date: 03/22/2022
8+
ms.date: 05/12/2022
99
---
1010

1111
# Azure Automanage for Machines Best Practices - Azure Arc-enabled servers
@@ -18,12 +18,10 @@ For all of these services, we will auto-onboard, auto-configure, monitor for dri
1818

1919
Automanage supports the following operating systems for Azure Arc-enabled servers
2020

21-
- Windows Server 2012/R2
22-
- Windows Server 2016
23-
- Windows Server 2019
21+
- Windows Server 2012 R2, 2016, 2019, 2022
2422
- CentOS 7.3+, 8
2523
- RHEL 7.4+, 8
26-
- Ubuntu 16.04 and 18.04
24+
- Ubuntu 16.04, 18.04, 20.04
2725
- SLES 12 (SP3-SP5 only)
2826

2927
## Participating services
@@ -32,6 +30,7 @@ Automanage supports the following operating systems for Azure Arc-enabled server
3230
|-----------|---------------|----------------------|
3331
|[Machines Insights Monitoring](../azure-monitor/vm/vminsights-overview.md) |Azure Monitor for machines monitors the performance and health of your virtual machines, including their running processes and dependencies on other resources. |Production |
3432
|[Update Management](../automation/update-management/overview.md) |You can use Update Management in Azure Automation to manage operating system updates for your machines. You can quickly assess the status of available updates on all agent machines and manage the process of installing required updates for servers. |Production, Dev/Test |
33+
|[Microsoft Antimalware](../security/fundamentals/antimalware.md) |Microsoft Antimalware for Azure is a free real-time protection that helps identify and remove viruses, spyware, and other malicious software. It generates alerts when known malicious or unwanted software tries to install itself or run on your Azure systems. **Note:** Microsoft Antimalware requires that there be no other antimalware software installed, or it may fail to work. This is also only supported for Windows Server 2016 and above. |Production, Dev/Test |
3534
|[Change Tracking & Inventory](../automation/change-tracking/overview.md) |Change Tracking and Inventory combines change tracking and inventory functions to allow you to track virtual machine and server infrastructure changes. The service supports change tracking across services, daemons software, registry, and files in your environment to help you diagnose unwanted changes and raise alerts. Inventory support allows you to query in-guest resources for visibility into installed applications and other configuration items. |Production, Dev/Test |
3635
|[Azure Guest Configuration](../governance/policy/concepts/guest-configuration.md) | Guest Configuration policy is used to monitor the configuration and report on the compliance of the machine. The Automanage service will install the Azure security baseline using the Guest Configuration extension. For Arc machines, the guest configuration service will install the baseline in audit-only mode. You will be able to see where your VM is out of compliance with the baseline, but noncompliance won't be automatically remediated. |Production, Dev/Test |
3736
|[Azure Automation Account](../automation/automation-create-standalone-account.md) |Azure Automation supports management throughout the lifecycle of your infrastructure and applications. |Production, Dev/Test |

articles/automanage/automanage-virtual-machines.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mmccrory
55
ms.service: automanage
66
ms.workload: infrastructure
77
ms.topic: conceptual
8-
ms.date: 10/19/2021
8+
ms.date: 5/12/2022
99
ms.author: memccror
1010
ms.custom: references_regions
1111
---
@@ -109,7 +109,7 @@ The only time you might need to interact with this machine to manage these servi
109109
## Enabling Automanage for VMs using Azure Policy
110110
You can also enable Automanage on VMs at scale using the built-in Azure Policy. The policy has a DeployIfNotExists effect, which means that all eligible VMs located within the scope of the policy will be automatically onboarded to Automanage VM Best Practices.
111111

112-
A direct link to the policy is [here](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F270610db-8c04-438a-a739-e8e6745b22d3).
112+
A direct link to the policy is [here](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2Ff889cab7-da27-4c41-a3b0-de1f6f87c55).
113113

114114
For more information, check out how to enable the [Automanage built-in policy](virtual-machines-policy-enable.md).
115115

articles/automanage/automanage-windows-server.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,22 @@ ms.date: 03/22/2022
99
ms.author: memccror
1010
---
1111

12-
# Azure Automanage for Machines Best Practices - Windows Server
12+
# Azure Automanage for Machines Best Practices - Windows
1313

1414
These Azure services are automatically onboarded for you when you use Automanage Machine Best Practices on a Windows Server VM. They are essential to our best practices white paper, which you can find in our [Cloud Adoption Framework](/azure/cloud-adoption-framework/manage/azure-server-management).
1515

1616
For all of these services, we will auto-onboard, auto-configure, monitor for drift, and remediate if drift is detected. To learn more, go to [Azure Automanage for virtual machines](automanage-virtual-machines.md).
1717

1818
## Supported Windows Server versions
1919

20-
Automanage supports the following Windows Server versions:
20+
Automanage supports the following Windows versions:
2121

22-
- Windows Server 2012/R2
22+
- Windows Server 2012 R2
2323
- Windows Server 2016
2424
- Windows Server 2019
2525
- Windows Server 2022
2626
- Windows Server 2022 Azure Edition
27+
- Windows 10
2728

2829
## Participating services
2930

articles/azure-resource-manager/management/tag-support.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Tag support for resources
33
description: Shows which Azure resource types support tags. Provides details for all Azure services.
44
ms.topic: conceptual
5-
ms.date: 04/20/2022
5+
ms.date: 05/13/2022
66
---
77

88
# Tag support for Azure resources
@@ -2934,7 +2934,7 @@ To get the same data as a file of comma-separated values, download [tag-support.
29342934
> | servers / usages | No | No |
29352935
> | servers / virtualNetworkRules | No | No |
29362936
> | servers / vulnerabilityAssessments | No | No |
2937-
> | virtualClusters | Yes | Yes |
2937+
> | virtualClusters | No | No |
29382938
29392939
<a id="sqlnote"></a>
29402940

articles/azure-resource-manager/templates/deploy-github-actions.md

Lines changed: 94 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Deploy Resource Manager templates by using GitHub Actions
33
description: Describes how to deploy Azure Resource Manager templates (ARM templates) by using GitHub Actions.
44
ms.topic: conceptual
5-
ms.date: 02/07/2022
5+
ms.date: 05/10/2022
66
ms.custom: github-actions-azure
77
---
88

@@ -27,11 +27,13 @@ The file has two sections:
2727

2828
|Section |Tasks |
2929
|---------|---------|
30-
|**Authentication** | 1. Define a service principal. <br /> 2. Create a GitHub secret. |
30+
|**Authentication** | 1. Generate deployment credentials. |
3131
|**Deploy** | 1. Deploy the Resource Manager template. |
3232

3333
## Generate deployment credentials
3434

35+
# [Service principal](#tab/userlevel)
36+
3537
You can create a [service principal](../../active-directory/develop/app-objects-and-service-principals.md#service-principal-object) with the [az ad sp create-for-rbac](/cli/azure/ad/sp#az-ad-sp-create-for-rbac) command in the [Azure CLI](/cli/azure/). Run this command with [Azure Cloud Shell](https://shell.azure.com/) in the Azure portal or by selecting the **Try it** button.
3638

3739
Create a resource group if you do not already have one.
@@ -61,8 +63,29 @@ In the example above, replace the placeholders with your subscription ID and res
6163
> [!IMPORTANT]
6264
> It is always a good practice to grant minimum access. The scope in the previous example is limited to the resource group.
6365
66+
# [OpenID Connect](#tab/openid)
67+
68+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
69+
70+
1. Open your GitHub repository and go to **Settings**.
71+
72+
1. Select **Settings > Secrets > New secret**.
73+
74+
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
75+
76+
|GitHub Secret | Active Directory Application |
77+
|---------|---------|
78+
|AZURE_CLIENT_ID | Application (client) ID |
79+
|AZURE_TENANT_ID | Directory (tenant) ID |
80+
|AZURE_SUBSCRIPTION_ID | Subscription ID |
81+
82+
1. Save each secret by selecting **Add secret**.
83+
84+
---
6485
## Configure the GitHub secrets
6586

87+
# [Service principal](#tab/userlevel)
88+
6689
You need to create secrets for your Azure credentials, resource group, and subscriptions.
6790

6891
1. In [GitHub](https://github.com/), browse your repository.
@@ -75,6 +98,25 @@ You need to create secrets for your Azure credentials, resource group, and subsc
7598

7699
1. Create an additional secret named `AZURE_SUBSCRIPTION`. Add your subscription ID to the secret's value field (example: `90fd3f9d-4c61-432d-99ba-1273f236afa2`).
77100

101+
# [OpenID Connect](#tab/openid)
102+
103+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
104+
105+
1. Open your GitHub repository and go to **Settings**.
106+
107+
1. Select **Settings > Secrets > New secret**.
108+
109+
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
110+
111+
|GitHub Secret | Active Directory Application |
112+
|---------|---------|
113+
|AZURE_CLIENT_ID | Application (client) ID |
114+
|AZURE_TENANT_ID | Directory (tenant) ID |
115+
|AZURE_SUBSCRIPTION_ID | Subscription ID |
116+
117+
1. Save each secret by selecting **Add secret**.
118+
119+
---
78120
## Add Resource Manager template
79121

80122
Add a Resource Manager template to your GitHub repository. This template creates a storage account.
@@ -94,8 +136,9 @@ The workflow file must be stored in the **.github/workflows** folder at the root
94136
1. Select **set up a workflow yourself**.
95137
1. Rename the workflow file if you prefer a different name other than **main.yml**. For example: **deployStorageAccount.yml**.
96138
1. Replace the content of the yml file with the following:
139+
# [Service principal](#tab/userlevel)
97140

98-
```yml
141+
```yml
99142
on: [push]
100143
name: Azure ARM
101144
jobs:
@@ -122,15 +165,57 @@ The workflow file must be stored in the **.github/workflows** folder at the root
122165

123166
# output containerName variable from template
124167
- run: echo ${{ steps.deploy.outputs.containerName }}
125-
```
168+
```
169+
170+
> [!NOTE]
171+
> You can specify a JSON format parameters file instead in the ARM Deploy action (example: `.azuredeploy.parameters.json`).
172+
173+
The first section of the workflow file includes:
174+
175+
- **name**: The name of the workflow.
176+
- **on**: The name of the GitHub events that triggers the workflow. The workflow is trigger when there is a push event on the main branch, which modifies at least one of the two files specified. The two files are the workflow file and the template file.
177+
178+
# [OpenID Connect](#tab/openid)
179+
180+
```yml
181+
on: [push]
182+
name: Azure ARM
183+
jobs:
184+
build-and-deploy:
185+
runs-on: ubuntu-latest
186+
steps:
187+
188+
# Checkout code
189+
- uses: actions/checkout@main
190+
191+
# Log into Azure
192+
- uses: azure/login@v1
193+
with:
194+
client-id: ${{ secrets.AZURE_CLIENT_ID }}
195+
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
196+
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
197+
198+
# Deploy ARM template
199+
- name: Run ARM deploy
200+
uses: azure/arm-deploy@v1
201+
with:
202+
subscriptionId: ${{ secrets.AZURE_SUBSCRIPTION }}
203+
resourceGroupName: ${{ secrets.AZURE_RG }}
204+
template: ./azuredeploy.json
205+
parameters: storageAccountType=Standard_LRS
206+
207+
# output containerName variable from template
208+
- run: echo ${{ steps.deploy.outputs.containerName }}
209+
```
126210

127-
> [!NOTE]
128-
> You can specify a JSON format parameters file instead in the ARM Deploy action (example: `.azuredeploy.parameters.json`).
211+
> [!NOTE]
212+
> You can specify a JSON format parameters file instead in the ARM Deploy action (example: `.azuredeploy.parameters.json`).
129213

130-
The first section of the workflow file includes:
214+
The first section of the workflow file includes:
131215

132-
- **name**: The name of the workflow.
133-
- **on**: The name of the GitHub events that triggers the workflow. The workflow is trigger when there is a push event on the main branch, which modifies at least one of the two files specified. The two files are the workflow file and the template file.
216+
- **name**: The name of the workflow.
217+
- **on**: The name of the GitHub events that triggers the workflow. The workflow is trigger when there is a push event on the main branch, which modifies at least one of the two files specified. The two files are the workflow file and the template file.
218+
---
134219

135220
1. Select **Start commit**.
136221
1. Select **Commit directly to the main branch**.

articles/backup/backup-azure-vms-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This section covers backup operation failure of Azure Virtual machine.
2828
* If Azure Backup is working, then the issue is likely with another backup solution.
2929
* Here is an example of an Event Viewer error 517 where Azure Backup was working fine but "Windows Server Backup" was failing:
3030
![Windows Server Backup failing](media/backup-azure-vms-troubleshoot/windows-server-backup-failing.png)
31-
* If Azure Backup is failing, then look for the corresponding error code in the section Common VM backup errors in this article.
31+
* If Azure Backup is failing, then look for the corresponding error code in the [Common issues](#common-issues) section.
3232
* If you see Azure Backup option greyed out on an Azure VM, hover over the disabled menu to find the reason. The reasons could be "Not available with EphemeralDisk" or "Not available with Ultra Disk".
3333
![Reasons for the disablement of Azure Backup option](media/backup-azure-vms-troubleshoot/azure-backup-disable-reasons.png)
3434

articles/backup/backup-support-matrix.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -146,8 +146,8 @@ Azure Backup has added the Cross Region Restore feature to strengthen data avail
146146

147147
| Backup Management type | Supported | Supported Regions |
148148
| ---------------------- | ------------------------------------------------------------ | ----------------- |
149-
| Azure VM | Supported for Azure VMs (including encrypted Azure VMs) with both managed and unmanaged disks. Not supported for classic VMs. | Available in all Azure public regions and sovereign regions, except for UG IOWA and UG Virginia. |
150-
| SQL /SAP HANA | Available | Available in all Azure public regions and sovereign regions, except for France Central, UG IOWA, and UG Virginia. |
149+
| Azure VM | Supported for Azure VMs (including encrypted Azure VMs) with both managed and unmanaged disks. Not supported for classic VMs. | Available in all Azure public regions and sovereign regions, except for UG IOWA. |
150+
| SQL /SAP HANA | Available | Available in all Azure public regions and sovereign regions, except for France Central and UG IOWA. |
151151
| MARS Agent/On premises | No | N/A |
152152
| AFS (Azure file shares) | No | N/A |
153153

0 commit comments

Comments
 (0)