You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-create-self-signed-certificate.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,16 +51,16 @@ Use the certificate you create using this method to authenticate from an applica
51
51
In an elevated PowerShell prompt, run the following command and leave the PowerShell console session open. Replace `{certificateName}` with the name that you wish to give to your certificate.
The **$cert** variable in the previous command stores your certificate in the current session and allows you to export it. The command below exports the certificate in `.cer` format. You can also export it in other formats supported on the Azure portal including `.pem` and `.crt`.
60
60
61
61
```powershell
62
62
63
-
Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\{certificateName}.cer" ## Specify your preferred location and replace {certificateName}
63
+
Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\$certname.cer" ## Specify your preferred location
64
64
65
65
```
66
66
@@ -74,8 +74,8 @@ Use this option to create a certificate and its private key if your application
74
74
In an elevated PowerShell prompt, run the following command and leave the PowerShell console session open. Replace `{certificateName}` with name that you wish to give your certificate.
@@ -113,7 +113,7 @@ If you created the certificate using Option 2, you can delete the key pair from
113
113
114
114
```powershell
115
115
116
-
Get-ChildItem -Path "Cert:\CurrentUser\My" | Where-Object {$_.Subject -Match "{certificateName}"} | Select-Object Thumbprint, FriendlyName ## Replace {privateKeyName} with the name you gave your certificate
Copy file name to clipboardExpand all lines: articles/active-directory/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ In this article, you learn how to assign a managed identity to an application ro
103
103
104
104
```azurecli
105
105
roleguid="0566419e-bb95-4d9d-a4f8-ed9a0f147fa6"
106
-
az rest -m POST -u https://graph.microsoft.com/beta/servicePrincipals/$oidForMI/appRoleAssignments -b "{\"principalId\": \"$oidForMI\", \"resourceId\": \"$serverSPOID\",\"appRoleId\": \"$roleguid\"}"
106
+
az rest -m POST -u https://graph.microsoft.com/v1.0/servicePrincipals/$oidForMI/appRoleAssignments -b "{\"principalId\": \"$oidForMI\", \"resourceId\": \"$serverSPOID\",\"appRoleId\": \"$roleguid\"}"
Copy file name to clipboardExpand all lines: articles/iot-dps/how-to-troubleshoot-dps.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,24 +46,24 @@ To learn more, see [alerts in Azure Monitor](../azure-monitor/alerts/alerts-over
46
46
47
47
1. Sign in to the [Azure portal](https://portal.azure.com).
48
48
49
-
2. Browse to your IoT hub.
49
+
2. Browse to your Device Provisioning Service.
50
50
51
51
3. Select **Diagnostics settings**.
52
52
53
-
4. Select **Turn on diagnostics**.
53
+
4. Select **Add diagnostic setting**.
54
54
55
-
5.Enable the desired logs to be collected.
55
+
5.Configure the desired logs to be collected.
56
56
57
57
| Log Name | Description |
58
58
|-------|------------|
59
59
| DeviceOperations | Logs related to device connection events |
60
60
| ServiceOperations | Event logs related to using service SDK (e.g. Creating or updating enrollment groups)|
61
61
62
-
6.Turn on **Send to Log Analytics** ([see pricing](https://azure.microsoft.com/pricing/details/log-analytics/)).
62
+
6.Tick the box **Send to Log Analytics** ([see pricing](https://azure.microsoft.com/pricing/details/log-analytics/)) and save.
63
63
64
64
7. Go to **Logs** tab in the Azure portal under Device Provisioning Service resource.
65
65
66
-
8.Click**Run** to view recent events.
66
+
8.Write **AzureDiagnostics** as a query and click**Run** to view recent events.
67
67
68
68
9. If there are results, look for `OperationName`, `ResultType`, `ResultSignature`, and `ResultDescription` (error message) to get more detail on the error.
69
69
@@ -78,4 +78,4 @@ Use this table to understand and resolve common errors.
78
78
| 404 | The Device Provisioning Service instance, or a resource (e.g. an enrollment) does not exist. |404 Not Found |
79
79
| 412 | The ETag in the request does not match the ETag of the existing resource, as per RFC7232. | 412 Precondition failed |
80
80
| 429 | Operations are being throttled by the service. For specific service limits, see [IoT Hub Device Provisioning Service limits](../azure-resource-manager/management/azure-subscription-service-limits.md#iot-hub-device-provisioning-service-limits). | 429 Too many requests |
81
-
| 500 | An internal error occurred. | 500 Internal Server Error|
81
+
| 500 | An internal error occurred. | 500 Internal Server Error|
Copy file name to clipboardExpand all lines: includes/resource-graph/samples/bycat/azure-virtual-machines.md
+20Lines changed: 20 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -355,6 +355,26 @@ Search-AzGraph -Query "PatchAssessmentResources | where type has 'softwarepatche
355
355
356
356
---
357
357
358
+
### List of unattached disks with details
359
+
360
+
Returns the list of disks that have a status of unattached with details. The query also includes the disk name, resource group, and location to enable triaging and mitigation as part of auditing or cost optimization efforts.
- Azure Government portal: <ahref="https://portal.azure.us/?feature.customportal=false#blade/HubsExtension/ArgQueryBlade/query/HealthResources%0a%7c%20where%20type%20%3d%7e%20%27microsoft.resourcehealth%2favailabilitystatuses%27%0a%7c%20summarize%20by%20ResourceId%20%3d%20tolower(tostring(properties.targetResourceId))%2c%20AvailabilityState%20%3d%20tostring(properties.availabilityState)"target="_blank">portal.azure.us</a>
375
+
- Azure China 21Vianet portal: <ahref="https://portal.azure.cn/?feature.customportal=false#blade/HubsExtension/ArgQueryBlade/query/HealthResources%0a%7c%20where%20type%20%3d%7e%20%27microsoft.resourcehealth%2favailabilitystatuses%27%0a%7c%20summarize%20by%20ResourceId%20%3d%20tolower(tostring(properties.targetResourceId))%2c%20AvailabilityState%20%3d%20tostring(properties.availabilityState)"target="_blank">portal.azure.cn</a>
376
+
```
377
+
358
378
### List of virtual machines and associated availability states by Resource Ids
359
379
360
380
Returns the latest list of virtual machines (type `Microsoft.Compute/virtualMachines`) aggregated by availability state. The query also provides the associated Resource Id based on `properties.targetResourceId`, for easy debugging and mitigation. Availability states can be one of four values: Available, Unavailable, Degraded and Unknown. For more details on what each of the availability states mean, please see [Azure Resource Health overview](../../../../articles/service-health/resource-health-overview.md#health-status).
0 commit comments