You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-modify-group-writeback.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,6 @@ If the original version of group writeback is already enabled and in use in your
32
32
33
33
To configure directory settings to disable automatic writeback of newly created Microsoft 365 groups, use one of these methods:
34
34
35
-
- Azure portal: Update the `NewUnifiedGroupWritebackDefault` setting to `false`.
36
35
- PowerShell: Use the [Microsoft Graph PowerShell SDK](/powershell/microsoftgraph/installation?view=graph-powershell-1.0&preserve-view=true). For example:
Copy file name to clipboardExpand all lines: articles/aks/faq.md
+18-1Lines changed: 18 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -311,7 +311,24 @@ AKS nodes run the "chrony" service, which pulls time from the localhost. Contai
311
311
312
312
## How are AKS addons updated?
313
313
314
-
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
314
+
Any patch, including security patches, is automatically applied to the AKS cluster. Anything bigger than a patch, like major or minor version changes (which can have breaking changes to your deployed objects), is updated when you update your cluster if a new release is available. You can find when a new release is available by visiting the [AKS release notes](https://github.com/Azure/AKS/releases).
315
+
316
+
## What is the purpose of the AKS Linux Extension I see installed on my Linux VMSS instances?
317
+
318
+
The AKS Linux Extension is an Azure VM extension whose purpose is to install and configure monitoring tools on Kubernetes worker nodes. The extension is installed on all new and existing Linux nodes. It configures the following monitoring tools:
319
+
320
+
- [Node-exporter](https://github.com/prometheus/node_exporter): collects hardware telemetry from the virtual machine and makes it available using a metrics endpoint. These metrics are then able to be scraped by a monitoring tool such as Prometheus.
321
+
- [Node-problem-detector](https://github.com/kubernetes/node-problem-detector): aims to make various node problems visible to upstream layers in the cluster management stack. It is a systemd unit that runs on each node, detects node problems, and reports them to the cluster’s API server using Events and NodeConditions.
322
+
- [Local-gadget](https://www.inspektor-gadget.io/docs/latest/local-gadget/): uses in-kernel eBPF helper programs to monitor events mainly related to syscalls from userspace programs in a pod.
323
+
324
+
These tools assist in providing observability around many node health related problems such as:
325
+
326
+
- Infrastructure daemon issues: NTP service down
327
+
- Hardware issues: Bad CPU, memory or disk
328
+
- Kernel issues: Kernel deadlock, corrupted file system
The extension **does not** require any additional outbound access to any URLs, IP addresses, or ports beyond the [documented AKS egress requirements](./limit-egress-traffic.md). It does not require any special permissions granted in Azure. It uses kubeconfig to connect to the API server to send the monitoring data collected.
Copy file name to clipboardExpand all lines: articles/azure-arc/kubernetes/tutorial-use-gitops-flux2.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -582,7 +582,7 @@ When you delete a Flux configuration, all of the Flux configuration objects in t
582
582
583
583
When you delete the Flux extension, both the `microsoft.flux` extension resource in Azure and the Flux extension objects in the cluster will be removed.
584
584
585
-
For an Azure Arc-enabled Kubernetes cluster, navigate to the cluster and select **Extensions**. Select the `flux` extension and select **Delete**, then confirm the deletion.
585
+
For an Azure Arc-enabled Kubernetes cluster, navigate to the cluster and select **Extensions**. Select the `flux` extension and select **Uninstall**, then confirm the deletion.
586
586
587
587
For AKS clusters, you can't use the Azure portal to delete the extension. Instead, use the following Azure CLI command:
Copy file name to clipboardExpand all lines: articles/cosmos-db/how-to-always-encrypted.md
-5Lines changed: 0 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,11 +54,6 @@ For each property that you want to encrypt, the encryption policy defines:
54
54
- An encryption type. It can be either randomized or deterministic.
55
55
- The encryption algorithm to use when encrypting the property. The specified algorithm can override the algorithm defined when creating the key if they are compatible.
56
56
57
-
> [!NOTE]
58
-
> The following properties can't be encrypted:
59
-
> - ID
60
-
> - The container's partition key
61
-
62
57
#### Randomized vs. deterministic encryption
63
58
64
59
The Azure Cosmos DB service never sees the plain text of properties encrypted with Always Encrypted. However, it still supports some querying capabilities over the encrypted data, depending on the encryption type used for a property. Always Encrypted supports the following two types of encryptions:
Copy file name to clipboardExpand all lines: articles/private-link/rbac-permissions.md
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,6 +129,16 @@ This section lists the granular permissions required to deploy a private link se
129
129
}
130
130
```
131
131
132
+
## Approval RBAC for private endpoint
133
+
134
+
Typically, a network administrator creates a private endpoint. Depending on your Azure role-based access control (RBAC) permissions, a private endpoint that you create is either *automatically approved* to send traffic to the API Management instance, or requires the resource owner to *manually approve* the connection.
0 commit comments