You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-files-faq.yml
+14-2Lines changed: 14 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
metadata:
3
3
title: Back up Azure Files FAQ
4
4
description: In this article, discover answers to common questions about how to protect your Azure file shares with the Azure Backup service.
5
-
ms.date: 12/11/2024
5
+
ms.date: 01/08/2025
6
6
ms.topic: faq
7
7
ms.service: azure-backup
8
8
author: AbhishekMallick-MS
@@ -74,6 +74,11 @@ sections:
74
74
| **Daily** | Add the retention values configured for daily, weekly, monthly, and yearly backups. For example, you configure a backup policy with the following values: <br><br> - Daily retention: 30 days <br> - Weekly retention: 40 weeks <br> - Monthly retention: 4 months <br> - Yearly retention: 6 years | This corresponds to 80 snapshots (30+40+4+6).
75
75
| **Hourly** | There's a buffer allocated for any delay in pruning the expired snapshots. For example, you configure a backup policy with: <br><br> - Number of daily snapshots as per your schedule: 6 <br> - Daily retention: 30 days <br> - Monthly retention: 11 months <br> - Yearly retention: 8 years | Considering 1 day buffer for each daily snapshot, the daily retention of 30 days is considered as 31 days for each of the 6 daily snapshots. So, this configuration corresponds to 205 [(6X31)+11+8] snapshots.
76
76
77
+
- question: |
78
+
What is the maximum delay expected in backup start time from the scheduled backup time I have set in my backup policy?
79
+
answer: |
80
+
The scheduled backup is triggered within 2 hours of the scheduled backup time. For example, If 100 File Shares have their backup start time scheduled at 2:00 AM, then by 4:00 AM at the latest all the 100 File Shares will have their backup job in progress. If scheduled backups are paused because of an outage and resumed or retried, then the backup can start outside of this scheduled two-hour window.
81
+
77
82
78
83
79
84
- name: Restore
@@ -98,6 +103,13 @@ sections:
98
103
answer: |
99
104
If a recovery point isn't listed, it must have expired. We recommend you checking the retention configured in the backup policy to understand the retention duration for recovery points of your backed-up file share.
100
105
106
+
- question: |
107
+
Why is my restore operation taking long time to complete?
108
+
answer: |
109
+
If you are restoring from snapshot backup, for Original Location Recovery (OLR) the total restore time depends on number of files and directories in the share. When you restore to alternate location, the restore time depends on number of files and directories in the share to be restored and available IOPS on source and target storage account.
110
+
111
+
112
+
101
113
- name: Manage backup
102
114
questions:
103
115
- question: |
@@ -280,7 +292,7 @@ sections:
280
292
- question: |
281
293
Why the expiry time for latest recovery points doesn't appear in the Azure portal?
282
294
answer: |
283
-
Expiry Time of recovery points are updated when Garbage Collector (GC) runs, which is every 24 hours. After you update the backup policy, it can take up to 24 hours to show the updates in the Expiry Time, if there're no delays in GC jobs.
295
+
Expiry Time of recovery points is updated when Garbage Collector (GC) runs, which is every 24 hours. After you update the backup policy, it can take up to 24 hours to show the updates in the Expiry Time, if there're no delays in GC jobs.
284
296
285
297
- question: |
286
298
How is the expiry date shown when both snapshot and vaulted backups are configured?
| Rule_4 | * | https:443 | storage_account_name.blob.core.windows.net | Replace `storage_account_name` with your actual storage account name. Make sure ["secure transfer required"](../storage/common/storage-require-secure-transfer.md) is enabled on the storage account. If you're using Private endpoint to access storage accounts, this step isn't needed and storage traffic isn't forwarded to the firewall.|
74
74
| Rule_5 | * | http:80 | azure.archive.ubuntu.com | Allows Ubuntu security updates to be installed on the cluster |
description: Learn how to troubleshoot cluster DNS issues.
4
+
author: papadeltasierra
5
+
ms.author: pauldsmith
6
+
ms.service: azure-operator-nexus
7
+
ms.custom: azure-operator-nexus
8
+
ms.topic: troubleshooting
9
+
ms.date: 12/10/2024
10
+
# ms.custom: template-include
11
+
---
12
+
13
+
# Troubleshoot Nexus DNS Issues
14
+
15
+
NNF (Nexus Network Fabric) provides a bridge between Nexus resources hosted by a Kubernetes
16
+
cluster running on Azure VMs (Virtual Machines) and Azure, accessing Azure resources via their
17
+
domain names. However a DNS (Domain Name System) error in NNF can mean that Azure resources
18
+
can't be contacted which impacts deployment or management of Nexus resources.
19
+
20
+
The DNS proxy that causes this error is an [Envoy DNS Proxy](https://www.envoyproxy.io/docs/envoy/latest/)
21
+
running via a Kubernetes deployment in either an infrastructure or tenant Kubernetes cluster.
22
+
The precise location of the DNS proxy is determined when the customer
23
+
deploys their NAKS (Nexus Azure Kubernetes Service) cluster or during some other
24
+
deployment.
25
+
26
+
## Diagnosis
27
+
28
+
* Deployment or management of remote Nexus resources fails with "DeploymentFailed."
29
+
* Azure portal shows no errors being generated for the Azure resources that are unreachable; there are no errors because the failing operations aren't reaching the Azure resources at all.
30
+
31
+
## Mitigation steps
32
+
33
+
### Trigger a DNS cache refresh for the NNF Workload Proxy
34
+
35
+
- Identify the Infrastructure or Tenant Kubernetes Cluster on which the DNS proxy is running from the initial configuration and deployment process
36
+
- Log in to the Kubernetes cluster
37
+
- Using the Azure portal, find your cluster
38
+
- From the _Overview_ blade, click the _Connect_ command (between _Refresh_ and _Delete_)
39
+
- Follow the instructions from the resulting pop-up window that explain how to connect to the Kubernetes cluster
40
+
- Identify the DNS proxy deployment using this command
41
+
```bash
42
+
$ kubectl get deployments --all-namespaces=true | grep envoy
43
+
```
44
+
- Restart the deployment, which causes the DNS caching to be reset, using this command:
Copy file name to clipboardExpand all lines: articles/sentinel/dynamics-365/deploy-dynamics-365-finance-operations-solution.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,9 @@ ms.date: 11/14/2024
11
11
12
12
---
13
13
14
-
# Deploy Microsoft Sentinel solution for Dynamics 365 Finance and Operations
14
+
# Deploy for Dynamics 365 Finance and Operations
15
15
16
-
This article describes how to deploy the Microsoft Sentinel solution for Dynamics 365 Finance and Operations. The solution monitors and protects your Dynamics 365 Finance and Operations system: It collects audits and activity logs from the Dynamics 365 Finance and Operations environment, and detects threats, suspicious activities, illegitimate activities, and more. [Read more about the solution](dynamics-365-finance-operations-solution-overview.md).
16
+
This article describes how to deploy the Dynamics 365 Finance and Operations content within the Microsoft Sentinel solution for Microsoft Business Applications. The solution monitors and protects your Dynamics 365 Finance and Operations system: It collects audits and activity logs from the Dynamics 365 Finance and Operations environment, and detects threats, suspicious activities, illegitimate activities, and more. [Read more about the solution](dynamics-365-finance-operations-solution-overview.md).
17
17
18
18
> [!IMPORTANT]
19
19
> - The Microsoft Sentinel solution for Dynamics 365 Finance and Operations is currently in PREVIEW. The [Azure Preview Supplemental Terms](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) include additional legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -23,7 +23,8 @@ This article describes how to deploy the Microsoft Sentinel solution for Dynamic
23
23
24
24
Before you begin, verify that:
25
25
26
-
- The Microsoft Sentinel solution is enabled.
26
+
- The Microsoft Sentinel solution for Microsoft Business Applications solution is enabled.
27
+
27
28
- You have a defined Microsoft Sentinel workspace and have read and write permissions to the workspace.
28
29
-[Microsoft Dynamics 365 Finance version 10.0.33 or above](/dynamics365/finance/get-started/whats-new-changed-changed-10-0-33) is enabled and you have administrative access to the monitored environments.
29
30
- You can create [Data Collection Rules/Endpoints](/azure/azure-monitor/essentials/data-collection-rule-overview) with the permissions:
@@ -46,8 +47,8 @@ Before you begin, verify that:
46
47
## Deploy the solution and enable the data connector
47
48
48
49
1. Navigate to the **Microsoft Sentinel** service.
49
-
1. Select **Content hub**, and in the search bar, search for *Dynamics 365 Finance and Operations*.
50
-
1. Select **Dynamics 365 Finance and Operations**.
50
+
1. Select **Content hub**, and in the search bar, search for *Microsoft Business Applications*.
51
+
1. Select **Microsoft Business Applications**.
51
52
1. Select **Install**.
52
53
53
54
For more information about how to manage the solution components, see [Discover and deploy out-of-the-box content](../sentinel-solutions-deploy.md).
@@ -153,8 +154,8 @@ To verify that log ingestion is working:
153
154
154
155
## Related content
155
156
156
-
In this article, you learned how to deploy the Microsoft Sentinel solution for Dynamics 365 Finance and Operations.
157
-
157
+
In this article, you learned how to deploy Dynamics 365 Finance and Operations features included in the Microsoft Sentinel solution for Microsoft Business Applications.
158
+
158
159
-[Learn how to enable the security content](../sentinel-solutions-deploy.md#analytics-rule)
159
160
-[Review the solution's security content](dynamics-365-finance-operations-security-content.md)
Copy file name to clipboardExpand all lines: articles/virtual-network/service-tags-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ By default, service tags reflect the ranges for the entire cloud. Some service t
108
108
|**[M365ManagementActivityApi](/office/office-365-management-api/office-365-management-activity-api-reference#working-with-the-office-365-management-activity-api)**| The Office 365 Management Activity API provides information about various user, admin, system, and policy actions and events from Office 365 and Microsoft Entra activity logs. Customers and partners can use this information to create new or enhance existing operations, security, and compliance-monitoring solutions for the enterprise.<br/><br/>**Note**: This tag has a dependency on the **AzureActiveDirectory** tag. | Outbound | Yes | Yes |
109
109
|**[M365ManagementActivityApiWebhook](/office/office-365-management-api/office-365-management-activity-api-reference#working-with-the-office-365-management-activity-api)**| Notifications are sent to the configured webhook for a subscription as new content becomes available. | Inbound | Yes | Yes |
110
110
|**MicrosoftAzureFluidRelay**| This tag represents the IP addresses used for Azure Microsoft Fluid Relay Server. </br> **Note**: This tag has a dependency on the **AzureFrontDoor.Frontend** tag. | Outbound | No | Yes |
111
-
|**MicrosoftCloudAppSecurity**| Microsoft Defender for Cloud Apps. |Outbound| No | Yes |
111
+
|**[MicrosoftCloudAppSecurity](/defender-cloud-apps/network-requirements)**| Microsoft Defender for Cloud Apps. |Both| No | Yes |
112
112
|**[MicrosoftDefenderForEndpoint](/defender-endpoint/configure-device-connectivity)**| Microsoft Defender for Endpoint core services.<br/><br/>**Note**: Devices need to be onboarded with streamlined connectivity and meet requirements in order to use this service tag. Defender for Endpoint/Server require additional service tags, like OneDSCollector, to support all functionality.<br/></br> For more information, see [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/configure-device-connectivity)| Both | No | Yes |
113
113
|**[PowerBI](/power-bi/enterprise/service-premium-service-tags)**| Power BI platform backend services and API endpoints.<br/><br/> | Both | No | Yes |
114
114
|**[PowerPlatformInfra](/power-platform/admin/online-requirements)**| This tag represents the IP addresses used by the infrastructure to host Power Platform services. | Both | Yes | Yes |
0 commit comments