Skip to content

Commit f0c3ac1

Browse files
authored
Merge pull request #300008 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents a9b0b88 + 8eec162 commit f0c3ac1

File tree

5 files changed

+20
-9
lines changed

5 files changed

+20
-9
lines changed

articles/azure-vmware/configure-storage-policy.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,9 @@ In this article learn how to:
3333
> * Remove storage policy
3434
3535

36-
## Prerequisites
36+
## Prerequisites (For vSAN OSA based clusters)
3737

38-
Make sure that the [minimum level of hosts are met](https://techdocs.broadcom.com/us/en/vmware-cis/cloud/vmware-cloud-on-aws/SaaS/operations-guide/managing-sddc-hosts-and-clusters/vsan-storage-in-vmware-cloud-on-aws/virtual-san-policies-aws.html).
38+
Make sure that the minimum level of hosts are met.
3939

4040
| **RAID configuration** | **Failures to tolerate (FTT)** | **Minimum hosts required** |
4141
| --- | :---: | :---: |
@@ -46,6 +46,17 @@ Make sure that the [minimum level of hosts are met](https://techdocs.broadcom.co
4646
| RAID-1 (Mirroring) | 3 | 7 |
4747

4848

49+
## Prerequisites (For vSAN ESA based clusters)
50+
51+
Make sure that the minimum level of hosts are met.
52+
53+
| **RAID configuration** | **Failures to tolerate (FTT)** | **Minimum hosts required** |
54+
| --- | :---: | :---: |
55+
| RAID-1 (Mirroring) <br />Default setting. | 1 | 3 |
56+
| RAID-5 (ESA Optimized) | 1 | 3 |
57+
| RAID-1 (Mirroring) | 2 | 5 |
58+
| RAID-6 (ESA Optimized) | 2 | 5 |
59+
| RAID-1 (Mirroring) | 3 | 7 |
4960

5061

5162
## List storage policies

articles/role-based-access-control/includes/query/authorization-same-principal-scope-condition.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ ms.author: rolyon
77
---
88

99
```kusto
10-
AuthorizationResources
10+
authorizationresources
1111
| where type =~ "microsoft.authorization/roleassignments"
1212
| where id startswith "/subscriptions"
1313
| extend PrincipalId = tostring(properties.principalId)
1414
| extend Scope = tolower(properties.scope)
1515
| extend RoleDefinitionId = tolower(tostring(properties.roleDefinitionId))
1616
| extend condition = tostring(properties.condition)
1717
| join kind = leftouter (
18-
AuthorizationResources
18+
authorizationresources
1919
| where type =~ "microsoft.authorization/roledefinitions"
2020
| extend RoleName = tostring(properties.roleName)
2121
| extend RoleId = tolower(id)

articles/role-based-access-control/includes/query/authorization-same-principal-scope.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ ms.author: rolyon
77
---
88

99
```kusto
10-
AuthorizationResources
10+
authorizationresources
1111
| where type =~ "microsoft.authorization/roleassignments"
1212
| where id startswith "/subscriptions"
1313
| extend PrincipalId = tostring(properties.principalId)
1414
| extend Scope = tolower(properties.scope)
1515
| extend RoleDefinitionId = tolower(tostring(properties.roleDefinitionId))
1616
| join kind = leftouter (
17-
AuthorizationResources
17+
authorizationresources
1818
| where type =~ "microsoft.authorization/roledefinitions"
1919
| extend RoleName = tostring(properties.roleName)
2020
| extend RoleId = tolower(id)

articles/role-based-access-control/includes/query/authorization-same-role-principal-condition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ authorizationresources
2121
| extend rdId = tolower(id)
2222
| project RoleDefinitionName, rdId
2323
) on $left.RoleDefinitionId == $right.rdId
24-
| summarize count_ = count(), Scopes = make_set(tolower(properties.scope)) by RoleDefinitionId_PrincipalId,RoleDefinitionName
24+
| summarize count_ = count(), Scopes = make_set(tolower(properties.scope)) by RoleDefinitionId_PrincipalId,RoleDefinitionName, condition
2525
| project RoleDefinitionId = split(RoleDefinitionId_PrincipalId, "_", 0)[0], RoleDefinitionName, PrincipalId = split(RoleDefinitionId_PrincipalId, "_", 1)[0], count_, Scopes, condition
2626
| where count_ > 1
2727
| order by count_ desc

articles/role-based-access-control/includes/query/authorization-unused-custom-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ ms.author: rolyon
77
---
88

99
```kusto
10-
AuthorizationResources
10+
authorizationresources
1111
| where type =~ "microsoft.authorization/roledefinitions"
1212
| where tolower(properties.type) == "customrole"
1313
| extend rdId = tolower(id)
1414
| extend Scope = tolower(properties.assignableScopes)
1515
| join kind = leftouter (
16-
AuthorizationResources
16+
authorizationresources
1717
| where type =~ "microsoft.authorization/roleassignments"
1818
| extend RoleId = tolower(tostring(properties.roleDefinitionId))
1919
| summarize RoleAssignmentCount = count() by RoleId

0 commit comments

Comments
 (0)