Skip to content

Commit ec61223

Browse files
authored
Merge pull request #231055 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 6e00a64 + dda224d commit ec61223

File tree

5 files changed

+29
-8
lines changed

5 files changed

+29
-8
lines changed

articles/active-directory/hybrid/how-to-connect-modify-group-writeback.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@ If the original version of group writeback is already enabled and in use in your
3232

3333
To configure directory settings to disable automatic writeback of newly created Microsoft 365 groups, use one of these methods:
3434

35-
- Azure portal: Update the `NewUnifiedGroupWritebackDefault` setting to `false`.
3635
- PowerShell: Use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true). For example:
3736

3837
```PowerShell

articles/aks/faq.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,24 @@ AKS nodes run the "chrony" service, which pulls time from the localhost. Contai
311311
312312
## How are AKS addons updated?
313313
314-
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
314+
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
315+
316+
## What is the purpose of the AKS Linux Extension I see installed on my Linux VMSS instances?
317+
318+
The AKS Linux Extension is an Azure VM extension whose purpose is to install and configure monitoring tools on Kubernetes worker nodes. The extension is installed on all new and existing Linux nodes. It configures the following monitoring tools:
319+
320+
- [Node-exporter](https://github.com/prometheus/node_exporter): collects hardware telemetry from the virtual machine and makes it available using a metrics endpoint. These metrics are then able to be scraped by a monitoring tool such as Prometheus.
321+
- [Node-problem-detector](https://github.com/kubernetes/node-problem-detector): aims to make various node problems visible to upstream layers in the cluster management stack. It is a systemd unit that runs on each node, detects node problems, and reports them to the cluster’s API server using Events and NodeConditions.
322+
- [Local-gadget](https://www.inspektor-gadget.io/docs/latest/local-gadget/): uses in-kernel eBPF helper programs to monitor events mainly related to syscalls from userspace programs in a pod.
323+
324+
These tools assist in providing observability around many node health related problems such as:
325+
326+
- Infrastructure daemon issues: NTP service down
327+
- Hardware issues: Bad CPU, memory or disk
328+
- Kernel issues: Kernel deadlock, corrupted file system
329+
- Container runtime issues: Unresponsive runtime daemon
330+
331+
The extension **does not** require any additional outbound access to any URLs, IP addresses, or ports beyond the [documented AKS egress requirements](./limit-egress-traffic.md). It does not require any special permissions granted in Azure. It uses kubeconfig to connect to the API server to send the monitoring data collected.
315332
316333
<!-- LINKS - internal -->
317334

articles/azure-arc/kubernetes/tutorial-use-gitops-flux2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -582,7 +582,7 @@ When you delete a Flux configuration, all of the Flux configuration objects in t
582582

583583
When you delete the Flux extension, both the `microsoft.flux` extension resource in Azure and the Flux extension objects in the cluster will be removed.
584584

585-
For an Azure Arc-enabled Kubernetes cluster, navigate to the cluster and select **Extensions**. Select the `flux` extension and select **Delete**, then confirm the deletion.
585+
For an Azure Arc-enabled Kubernetes cluster, navigate to the cluster and select **Extensions**. Select the `flux` extension and select **Uninstall**, then confirm the deletion.
586586

587587
For AKS clusters, you can't use the Azure portal to delete the extension. Instead, use the following Azure CLI command:
588588

articles/cosmos-db/how-to-always-encrypted.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -54,11 +54,6 @@ For each property that you want to encrypt, the encryption policy defines:
5454
- An encryption type. It can be either randomized or deterministic.
5555
- The encryption algorithm to use when encrypting the property. The specified algorithm can override the algorithm defined when creating the key if they are compatible.
5656

57-
> [!NOTE]
58-
> The following properties can't be encrypted:
59-
> - ID
60-
> - The container's partition key
61-
6257
#### Randomized vs. deterministic encryption
6358

6459
The Azure Cosmos DB service never sees the plain text of properties encrypted with Always Encrypted. However, it still supports some querying capabilities over the encrypted data, depending on the encryption type used for a property. Always Encrypted supports the following two types of encryptions:

articles/private-link/rbac-permissions.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,16 @@ This section lists the granular permissions required to deploy a private link se
129129
}
130130
```
131131

132+
## Approval RBAC for private endpoint
133+
134+
Typically, a network administrator creates a private endpoint. Depending on your Azure role-based access control (RBAC) permissions, a private endpoint that you create is either *automatically approved* to send traffic to the API Management instance, or requires the resource owner to *manually approve* the connection.
135+
136+
137+
|Approval method |Minimum RBAC permissions |
138+
|---------|---------|
139+
|Automatic | `Microsoft.Network/virtualNetworks/**`<br/>`Microsoft.Network/virtualNetworks/subnets/**`<br/>`Microsoft.Network/privateEndpoints/**`<br/>`Microsoft.Network/networkinterfaces/**`<br/>`Microsoft.Network/locations/availablePrivateEndpointTypes/read`<br/>`Microsoft.ApiManagement/service/**`<br/>`Microsoft.ApiManagement/service/privateEndpointConnections/**` |
140+
|Manual | `Microsoft.Network/virtualNetworks/**`<br/>`Microsoft.Network/virtualNetworks/subnets/**`<br/>`Microsoft.Network/privateEndpoints/**`<br/>`Microsoft.Network/networkinterfaces/**`<br/>`Microsoft.Network/locations/availablePrivateEndpointTypes/read` |
141+
132142
## Next steps
133143

134144
For more information on private endpoint and private link services in Azure Private link, see:

0 commit comments

Comments
 (0)