Skip to content

Commit dfc26a5

Browse files
authored
Merge pull request #217007 from MicrosoftDocs/main
Publish to live, Thursday 4AM PST 11/03
2 parents bfa869c + 0734214 commit dfc26a5

File tree

175 files changed

+778
-733
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+778
-733
lines changed

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,19 @@ If you want all the latest features and updates, check this page and install wha
7777

7878
To read more about auto-upgrade, see [Azure AD Connect: Automatic upgrade](how-to-connect-install-automatic-upgrade.md).
7979

80+
## 2.1.19.0
81+
82+
### Release status:
83+
11/2/2022: Released for download
84+
85+
### Functional changes
86+
87+
- We added a new attribute 'employeeLeaveDateTime' for syncing to Azure AD
88+
89+
### Bug fixes
90+
91+
- we fixed a bug where Azure AD Connect Password writeback stopped with error code "SSPR_0029 ERROR_ACCESS_DENIED"
92+
8093
## 2.1.18.0
8194

8295
### Release status:

articles/aks/node-access.md

Lines changed: 2 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Connect to Azure Kubernetes Service (AKS) cluster nodes
33
description: Learn how to connect to Azure Kubernetes Service (AKS) cluster nodes for troubleshooting and maintenance tasks.
44
services: container-service
55
ms.topic: article
6-
ms.date: 11/1/2022
6+
ms.date: 11/3/2022
77

88
ms.custom: contperf-fy21q4
99

@@ -14,7 +14,7 @@ ms.custom: contperf-fy21q4
1414

1515
Throughout the lifecycle of your Azure Kubernetes Service (AKS) cluster, you might need to access an AKS node. This access could be for maintenance, log collection, or troubleshooting operations. You can securely authenticate against AKS Linux and Windows nodes using SSH, and you can also [connect to Windows Server nodes using remote desktop protocol (RDP)][aks-windows-rdp]. For security reasons, the AKS nodes aren't exposed to the internet. To connect to the AKS nodes, you use `kubectl debug` or the private IP address.
1616

17-
This article shows you how to create a connection to an AKS node and update the SSH key on an existing AKS cluster.
17+
This article shows you how to create a connection to an AKS node.
1818

1919
## Before you begin
2020

@@ -163,37 +163,6 @@ When done, `exit` the SSH session, stop any port forwarding, and then `exit` the
163163
kubectl delete pod node-debugger-aks-nodepool1-12345678-vmss000000-bkmmx
164164
```
165165
166-
## Update SSH key on an existing AKS cluster (preview)
167-
168-
### Prerequisites
169-
* Before you start, ensure the Azure CLI is installed and configured. If you need to install or upgrade, see [Install Azure CLI][install-azure-cli].
170-
* The aks-preview extension version 0.5.111 or later. To learn how to install an Azure extension, see [How to install extensions][how-to-install-azure-extensions].
171-
172-
> [!NOTE]
173-
> Updating of the SSH key is supported on Azure virtual machine scale sets with AKS clusters.
174-
175-
Use the [az aks update][az-aks-update] command to update the SSH key on the cluster. This operation will update the key on all node pools. You can either specify the key or a key file using the `--ssh-key-value` argument.
176-
177-
```azurecli
178-
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value <new SSH key value or SSH key file>
179-
```
180-
181-
Examples:
182-
In the following example, you can specify the new SSH key value for the `--ssh-key-value` argument.
183-
184-
```azurecli
185-
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value 'ssh-rsa AAAAB3Nza-xxx'
186-
```
187-
188-
In the following example, you specify a SSH key file.
189-
190-
```azurecli
191-
az aks update --name myAKSCluster --resource-group MyResourceGroup --ssh-key-value .ssh/id_rsa.pub
192-
```
193-
194-
> [!IMPORTANT]
195-
> During this operation, all virtual machine scale set instances are upgraded and re-imaged to use the new SSH key.
196-
197166
## Next steps
198167

199168
If you need more troubleshooting data, you can [view the kubelet logs][view-kubelet-logs] or [view the Kubernetes master node logs][view-master-logs].

articles/aks/use-pod-security-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ ms.date: 03/25/2021
88

99
# Preview - Secure your cluster using pod security policies in Azure Kubernetes Service (AKS)
1010

11-
[!Important]
12-
The feature described in this document, pod security policy (preview), will begin deprecation with Kubernetes version 1.21, with its removal in version 1.25. AKS will mark Pod Security Policy as "Deprecated" in the AKS API on 04-01-2023. You can now Migrate Pod Security Policy to Pod Security Admission Controller ahead of the deprecation.
11+
> [!Important]
12+
> The feature described in this article, pod security policy (preview), will be deprecated starting with Kubernetes version 1.21, and it will be removed in version 1.25. AKS will mark the pod security policy as Deprecated with the AKS API on 04-01-2023. You can migrate pod security policy to pod security admission controller before the deprecation deadline.
1313
1414
After pod security policy (preview) is deprecated, you must have already migrated to Pod Security Admission controller or disabled the feature on any existing clusters using the deprecated feature to perform future cluster upgrades and stay within Azure support.
1515

articles/azure-functions/python-scale-performance-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ You can set the value of maximum workers allowed for running sync functions usin
112112

113113
For CPU-bound apps, you should keep the setting to a low number, starting from 1 and increasing as you experiment with your workload. This suggestion is to reduce the time spent on context switches and allowing CPU-bound tasks to finish.
114114

115-
For I/O-bound apps, you should see substantial gains by increasing the number of threads working on each invocation. the recommendation is to start with the Python default - the number of cores + 4 and then tweak based on the throughput values you're seeing.
115+
For I/O-bound apps, you should see substantial gains by increasing the number of threads working on each invocation. the recommendation is to start with the Python default (the number of cores) + 4 and then tweak based on the throughput values you're seeing.
116116

117117
For mix workloads apps, you should balance both `FUNCTIONS_WORKER_PROCESS_COUNT` and `PYTHON_THREADPOOL_THREAD_COUNT` configurations to maximize the throughput. To understand what your function apps spend the most time on, we recommend profiling them and set the values according to the behavior they present. Also refer to this [section](#use-multiple-language-worker-processes) to learn about FUNCTIONS_WORKER_PROCESS_COUNT application settings.
118118

articles/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Define network settings and enable network isolation for Azure Moni
44
ms.topic: conceptual
55
author: shseth
66
ms.author: shseth
7-
ms.date: 10/14/2022
7+
ms.date: 11/01/2022
88
ms.custom: references_region
99
ms.reviewer: shseth
1010

@@ -54,37 +54,35 @@ The Azure Monitor Agent extensions for Windows and Linux can communicate either
5454
# [Windows VM](#tab/PowerShellWindows)
5555

5656
```powershell
57-
$settingsString = @{"proxy" = @{mode = "application"; address = "http://[address]:[port]"; auth = "true"}}
58-
$protectedSettingsString = @{"proxy" = @{username = "[username]"; password = "[password]"}}
59-
60-
Set-AzVMExtension -ExtensionName AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion 1.0 -SettingString $settingsString -ProtectedSettingString $protectedSettingsString
57+
$settingsString = '{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": true}}';
58+
$protectedSettingsString = '{"proxy":{"username":"[username]","password": "[password]"}}';
59+
Set-AzVMExtension -ExtensionName AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion <type-handler-version> -SettingString $settingsString -ProtectedSettingString $protectedSettingsString
6160
```
6261

6362
# [Linux VM](#tab/PowerShellLinux)
6463

6564
```powershell
66-
$settingsString = @{"proxy" = @{mode = "application"; address = "http://[address]:[port]"; auth = "true"}}
67-
$protectedSettingsString = @{"proxy" = @{username = "[username]"; password = "[password]"}}
68-
69-
Set-AzVMExtension -ExtensionName AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion 1.5 -SettingString $settingsString -ProtectedSettingString $protectedSettingsString
65+
$settingsString = '{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": true}}';
66+
$protectedSettingsString = '{"proxy":{"username":"[username]","password": "[password]"}}';
67+
Set-AzVMExtension -ExtensionName AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion <type-handler-version> -SettingString $settingsString -ProtectedSettingString $protectedSettingsString
7068
```
7169

7270
# [Windows Arc-enabled server](#tab/PowerShellWindowsArc)
7371

7472
```powershell
75-
$settingsString = @{"proxy" = @{mode = "application"; address = "http://[address]:[port]"; auth = "true"}}
76-
$protectedSettingsString = @{"proxy" = @{username = "[username]"; password = "[password]"}}
73+
$settings = @{"proxy" = @{mode = "application"; address = "http://[address]:[port]"; auth = "true"}}
74+
$protectedSettings = @{"proxy" = @{username = "[username]"; password = "[password]"}}
7775
78-
New-AzConnectedMachineExtension -Name AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Setting $settingsString -ProtectedSetting $protectedSettingsString
76+
New-AzConnectedMachineExtension -Name AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Setting $settings -ProtectedSetting $protectedSettings
7977
```
8078

8179
# [Linux Arc-enabled server](#tab/PowerShellLinuxArc)
8280

8381
```powershell
84-
$settingsString = @{"proxy" = @{mode = "application"; address = "http://[address]:[port]"; auth = "true"}}
85-
$protectedSettingsString = @{"proxy" = @{username = "[username]"; password = "[password]"}}
82+
$settings = @{"proxy" = @{mode = "application"; address = "http://[address]:[port]"; auth = "true"}}
83+
$protectedSettings = @{"proxy" = @{username = "[username]"; password = "[password]"}}
8684
87-
New-AzConnectedMachineExtension -Name AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Setting $settingsString -ProtectedSetting $protectedSettingsString
85+
New-AzConnectedMachineExtension -Name AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Setting $settings -ProtectedSetting $protectedSettings
8886
```
8987

9088
---

0 commit comments

Comments
 (0)