You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-policy-supported-skus.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,9 @@ ms.author: v-abhmallick
10
10
11
11
# Supported VM SKUs for Azure Policy
12
12
13
+
> [!CAUTION]
14
+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
15
+
13
16
Azure Backup provides a built-in policy (using Azure Policy) that can be assigned to **all Azure VMs in a specified location within a subscription or resource group**. When this policy is assigned to a given scope, all new VMs created in that scope are automatically configured for backup to an **existing vault in the same location and subscription**. The table below lists all the VM SKUs supported by this policy.
Copy file name to clipboardExpand all lines: articles/backup/backup-azure-restore-files-from-vm.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,9 @@ ms.author: v-abhmallick
10
10
---
11
11
# Recover files from Azure virtual machine backup
12
12
13
+
> [!CAUTION]
14
+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
15
+
13
16
Azure Backup provides the capability to restore [Azure virtual machines (VMs) and disks](./backup-azure-arm-restore-vms.md) from Azure VM backups, also known as recovery points. This article explains how to recover files and folders from an Azure VM backup. Restoring files and folders is available only for Azure VMs deployed using the Resource Manager model and protected to a Recovery Services vault.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/apply-security-baseline.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,9 @@ ms.date: 06/27/2023
9
9
10
10
# Review hardening recommendations
11
11
12
+
> [!CAUTION]
13
+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
14
+
12
15
> [!NOTE]
13
16
> As the Log Analytics agent (also known as MMA) is set to retire in [August 2024](https://azure.microsoft.com/updates/were-retiring-the-log-analytics-agent-in-azure-monitor-on-31-august-2024/), all Defender for Servers features that currently depend on it, including those described on this page, will be available through either [Microsoft Defender for Endpoint integration](integration-defender-for-endpoint.md) or [agentless scanning](concept-agentless-data-collection.md), before the retirement date. For more information about the roadmap for each of the features that are currently rely on Log Analytics Agent, see [this announcement](upcoming-changes.md#defender-for-cloud-plan-and-strategy-for-the-log-analytics-agent-deprecation).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,9 @@ ms.custom: build-2023
10
10
11
11
# Vulnerability assessment for Azure powered by Qualys (Deprecated)
12
12
13
+
> [!CAUTION]
14
+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
15
+
13
16
> [!IMPORTANT]
14
17
>
15
18
> The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**. If you are currently using container vulnerability assessment powered by Qualys, start planning your transition to [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-elastic.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,6 +9,9 @@ ms.topic: how-to
9
9
10
10
# Use Defender for Containers to scan your AWS ECR images for vulnerabilities powered by Trivy (Deprecated)
11
11
12
+
> [!CAUTION]
13
+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
14
+
12
15
Defender for Containers lets you scan the container images stored in your Amazon AWS Elastic Container Registry (ECR) as part of the protections provided within Microsoft Defender for Cloud.
13
16
14
17
To enable scanning of vulnerabilities in containers, you have to [connect your AWS account to Defender for Cloud](quickstart-onboard-aws.md) and [enable Defender for Containers](defender-for-containers-enable.md). The agentless scanner, powered by the open-source scanner Trivy, scans your ECR repositories and reports vulnerabilities.
@@ -115,7 +118,7 @@ Vulnerability findings for an image are still shown in the recommendation for 48
115
118
116
119
1. When you're sure the updated image has been pushed, scanned, and is no longer appearing in the recommendation, delete the “old” vulnerable image from your registry.
Azure allows you to have the flexibility of running a mix of uninterruptible standard VMs and interruptible Spot VMs for Virtual Machine Scale Set deployments. You're able to deploy this Spot Priority Mix using Flexible orchestration to easily balance between high-capacity availability and lower infrastructure costs according to your workload requirements. This feature allows you to easily manage your scale set capability to achieve the following goals:
19
22
@@ -49,21 +52,21 @@ You can set your Spot Priority Mix by using an ARM template to add the following
49
52
50
53
You can refer to this [ARM template example](https://paste.microsoft.com/f84d2f83-f6bf-4d24-aa03-175b0c43da32) for more context.
51
54
52
-
### [Portal](#tab/portal)
55
+
### [Portal](#tab/portal)
53
56
54
-
You can set your Spot Priority Mix in the Spot tab of the Virtual Machine Scale Sets creation process in the Azure portal. The following steps instruct you on how to access this feature during that process.
57
+
You can set your Spot Priority Mix in the Spot tab of the Virtual Machine Scale Sets creation process in the Azure portal. The following steps instruct you on how to access this feature during that process.
55
58
56
59
1. Log in to the [Azure portal](https://portal.azure.com).
57
60
1. In the search bar, search for and select **Virtual Machine Scale Sets**.
58
61
1. Select **Create** on the **Virtual Machine Scale Sets** page.
59
62
1. In the **Basics** tab, fill out the required fields, select **Flexible** as the **Orchestration** mode, and select the checkbox for **Run with Azure Spot discount**.
60
63
1. In the **Spot** tab, select the check-box next to *Scale with VMs and Spot VMs* option under the **Scale with VMs and discounted Spot VMs** section.
61
64
1. Fill out the **Base VM (uninterruptible) count** and **Instance distribution** fields to configure your percentage split between Spot and Standard VMs.
62
-
1. Continue through the Virtual Machine Scale Set creation process.
65
+
1. Continue through the Virtual Machine Scale Set creation process.
63
66
64
67
### [Azure CLI](#tab/cli)
65
68
66
-
You can set your Spot Priority Mix using Azure CLI by setting the `priority` flag to `Spot` and including the `regular-priority-count` and `regular-priority-percentage` flags.
69
+
You can set your Spot Priority Mix using Azure CLI by setting the `priority` flag to `Spot` and including the `regular-priority-count` and `regular-priority-percentage` flags.
67
70
68
71
```azurecli
69
72
az vmss create -n myScaleSet \
@@ -81,7 +84,7 @@ az vmss create -n myScaleSet \
81
84
82
85
### [Azure PowerShell](#tab/powershell)
83
86
84
-
You can set your Spot Priority Mix using Azure PowerShell by setting the `Priority` parameter to `Spot` and including the `BaseRegularPriorityCount` and `RegularPriorityPercentage` parameters.
87
+
You can set your Spot Priority Mix using Azure PowerShell by setting the `Priority` parameter to `Spot` and including the `BaseRegularPriorityCount` and `RegularPriorityPercentage` parameters.
85
88
86
89
```azurepowershell
87
90
$vmssConfig = New-AzVmssConfig `
@@ -114,13 +117,13 @@ You can update your existing Spot Priority Mix in the Configuration tab of the V
114
117
115
118
1. Navigate to the specific virtual machine scale set that you're adjusting the Spot Priority Mix on.
116
119
1. In the left side bar, scroll down to and select **Configuration**.
117
-
1. Your current Spot Priority Mix should be visible. Here you can change the **Base VM (uninterruptible) count** and **Instance distribution** of Spot and Standard VMs.
120
+
1. Your current Spot Priority Mix should be visible. Here you can change the **Base VM (uninterruptible) count** and **Instance distribution** of Spot and Standard VMs.
118
121
1. Update your Spot Mix as needed.
119
-
1. Press the **Save** button to apply your changes.
122
+
1. Press the **Save** button to apply your changes.
120
123
121
124
### [Azure CLI](#tab/cli)
122
125
123
-
You can update your Spot Priority Mix using Azure CLI by updating the `regular-priority-count` and `regular-priority-percentage` parameters.
126
+
You can update your Spot Priority Mix using Azure CLI by updating the `regular-priority-count` and `regular-priority-percentage` parameters.
124
127
125
128
```azurecli
126
129
az vmss update --resource-group myResourceGroup \
@@ -131,7 +134,7 @@ az vmss update --resource-group myResourceGroup \
131
134
132
135
### [Azure PowerShell](#tab/powershell)
133
136
134
-
You can update your Spot Priority Mix using Azure PowerShell by updating the `BaseRegularPriorityCount` and `RegularPriorityPercentage` parameters.
137
+
You can update your Spot Priority Mix using Azure PowerShell by updating the `BaseRegularPriorityCount` and `RegularPriorityPercentage` parameters.
135
138
136
139
```azurepowershell
137
140
$vmss = Get-AzVmss `
@@ -151,7 +154,7 @@ Update-AzVmss `
151
154
152
155
## Examples
153
156
154
-
The following examples have scenario assumptions, a table of actions, and walk-through of results to help you understand how Spot Priority Mix configuration works.
157
+
The following examples have scenario assumptions, a table of actions, and walk-through of results to help you understand how Spot Priority Mix configuration works.
155
158
156
159
Some important terminology to notice before referring to these examples:
157
160
@@ -188,7 +191,7 @@ Example walk-through:
188
191
- Note, because there's a 50/50 split, in the fourth scale-out, there's one more Spot VM than standard VM. Once it's scaled out again (5th scale-out), the 50/50 balance is restored with another standard VM.
189
192
1. You then scale in your scale set with the eviction policy being *evict-delete*, which deletes all the Spot VMs.
190
193
1. With the scale-out operations mentioned in this scenario, you restore the 50/50 balance in your scale set by only creating Spot VMs.
191
-
1. By the last scale-out, your scale set is already balanced, so one of each type of VM is created.
194
+
1. By the last scale-out, your scale set is already balanced, so one of each type of VM is created.
192
195
193
196
### Scenario 2
194
197
@@ -210,13 +213,13 @@ The following scenario assumptions apply to this example:
210
213
211
214
Example walk-through:
212
215
1. With the initial creation of the Virtual Machine Scale Set and Spot Priority Mix, you have 20 VMs.
213
-
- 10 of those VMs are the Base (standard) VMs, 2 extra standard VMs, and 8 Spot priority VMs for your 25% *regularPriorityPercentageAboveBase*.
214
-
- Another way to look at this ratio is you have 1 standard VM for every 4 Spot VMs in the scale set.
216
+
- 10 of those VMs are the Base (standard) VMs, 2 extra standard VMs, and 8 Spot priority VMs for your 25% *regularPriorityPercentageAboveBase*.
217
+
- Another way to look at this ratio is you have 1 standard VM for every 4 Spot VMs in the scale set.
215
218
2. You then scale out twice to create 90 more VMs; 23 standard VMs and 67 Spot VMs.
216
219
3. When you scale in by 10 VMs, 10 Spot VMs are *stop-deallocated*, creating an imbalance in your scale set.
217
220
4. Your next scale out operation creates another 2 standard VMs and 8 Spot VMs, bringing you closer to your 25% above base ratio.
218
221
219
-
## Troubleshooting
222
+
## Troubleshooting
220
223
221
224
If Spot Priority Mix isn't available to you, be sure to configure the `priorityMixPolicy` to specify a *Spot* priority in the `virtualMachineProfile`. Without enabling the `priorityMixPolicy` setting, you won't be able to access this Spot feature.
222
225
@@ -229,7 +232,7 @@ Spot Priority Mix applies for scale actions on the scale set. Changing the perce
229
232
Spot Priority Mix is only available on Virtual Machine Scale Sets with Flexible orchestration mode.
230
233
231
234
### Q: Which regions is Spot Priority Mix enabled in?
232
-
Spot VMs, and therefore Spot Priority Mix, are available in all global Azure regions.
235
+
Spot VMs, and therefore Spot Priority Mix, are available in all global Azure regions.
# Tutorial: Automatically scale a Virtual Machine Scale Set with the Azure CLI
14
+
15
+
> [!CAUTION]
16
+
> This article references CentOS, a Linux distribution that is nearing End Of Life (EOL) status. Please consider your use and planning accordingly.
17
+
14
18
When you create a scale set, you define the number of VM instances that you wish to run. As your application demand changes, you can automatically increase or decrease the number of VM instances. The ability to autoscale lets you keep up with customer demand or respond to application performance changes throughout the lifecycle of your app. In this tutorial you learn how to:
0 commit comments