Skip to content

Commit 6155b2b

Browse files
committed
Fixed blocking issues from PR review
1 parent 5ed022f commit 6155b2b

5 files changed

+8
-8
lines changed

azure-local/manage/disconnected-operations-arc-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Proxy servers aren't supported for outbound internet connections.
5959

6060
Create a VM in the portal by selecting **Azure Arc** > **Machines** > **Add/Create** > **Create a machine in a connected host environment**. For more information, see step 7 under the Create Azure Local VMs section.
6161

62-
:::image type="content" source="./media/disconnected-operations/arc-vms/create-arc-vms.png" alt-text="Screenshot showing how create an Azure Local VM from the portal." lightbox=" ./media/disconnected-operations/arc-vms/create-arc-vms.png":::
62+
:::image type="content" source="./media/disconnected-operations/arc-vms/create-arc-vms.png" alt-text="Screenshot showing how to create an Azure Local VM from the portal." lightbox=" ./media/disconnected-operations/arc-vms/create-arc-vms.png":::
6363

6464
## Create Azure Local VMs with disconnected operations
6565

azure-local/manage/disconnected-operations-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ For disconnected operations:
5151
1. Understand [public key infrastructure (PKI) for Azure Local with disconnected operations (preview)](disconnected-operations-pki.md)
5252
2. Set up and configure the certificate trusts for Azure CLI using PowerShell.
5353

54-
Here's an example script you can run in Powershell:
54+
Here's an example script you can run in PowerShell:
5555

5656
```powershell
5757
# Define the helper method

azure-local/manage/disconnected-operations-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ $idpConfig = @{
142142

143143
Consider these limitations when you plan your identity integration with disconnected operations:
144144

145-
- **Users/Group removal after synchronization**: If you remove users and groups with memberships after the last sync, disconnected operations doesn't clean them up. This can cause errors when you query group memberships.
145+
- **Users/Group removal after synchronization**: If you remove users and groups with memberships after the last sync, disconnected operations don't clean them up. This can cause errors when you query group memberships.
146146
- **No force synchronization capability**: Sync runs every 6 hours.
147147
- **No management groups or aggregate root level**: Not available for multiple subscriptions.
148148
- **Supported validations**: Only Active Directory/AD FS are validated for support.

azure-local/manage/disconnected-operations-on-demand-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ After you collect logs into a directory, either by using the nvoke-ApplianceLogC
194194

195195
The Send-DiagnosticData cmdlet requires subscription details, i.e. the ResourceGroupName, SubscriptionId, TenantId, and RegistrationRegion *. It also requires credentials, either via manual login or by providing the appropriate service principal with password. (See Observability Configuration setup section for steps to create resource group, service principal required to upload logs.)
196196

197-
You will to need to run Send-DiagnosticData on Windows machine connected to internet. You will not be able to run this on Azure Local Hosts as they can’t use Azure as Arc Control Plane when disconnected operations already configured. When this cmdlet runs, it will connect the machine to Azure using Arc Registration so the device can upload data to Microsoft support. Note: The RegistrationRegion is equivalent to Location within ObservabilityConfiguration.
197+
You will need to run Send-DiagnosticData on Windows machine connected to internet. You will not be able to run this on Azure Local Hosts as they can’t use Azure as Arc Control Plane when disconnected operations already configured. When this cmdlet runs, it will connect the machine to Azure using Arc Registration so the device can upload data to Microsoft support. Note: The RegistrationRegion is equivalent to Location within ObservabilityConfiguration.
198198

199199
Intended for use in cases where direct log collection from appliance VM is unavailable. It could be either due to control plane appliance VM is having issues where management endpoint is not accessible or appliance VM is disconnected from Azure
200200

@@ -431,7 +431,7 @@ This approach lets you share diagnostic data for support purposes without affect
431431
432432
### Use fallback log collection
433433
434-
Use fallback log collection to collect and send logs when the disconnected operations with Azure Local VM is down, the management endpoint isn't accessible, and you can't invoke standard log collection.
434+
Use fallback log collection to collect and send logs when the disconnected operations with Azure Local VM are down, the management endpoint isn't accessible, and you can't invoke standard log collection.
435435
436436
There are three methods used in this scenario:
437437

azure-local/manage/disconnected-operations-pki.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ PKI for disconnected operations is essential for securing the endpoints provided
2222

2323
## PKI requirements
2424

25-
A public certificate authorities (CA) or enterprise certificate authorities must issue certificates. Make sure your certificates are part of the Microsoft Trusted Root Program. For more information, see [List of Participants - Microsoft Trusted Root Program](/security/trusted-root/participants-list).
25+
A public certificate authority (CA) or enterprise certificate authority must issue certificates. Make sure your certificates are part of the Microsoft Trusted Root Program. For more information, see [List of Participants - Microsoft Trusted Root Program](/security/trusted-root/participants-list).
2626

2727
Mandatory certificates are grouped by area with the appropriate subject alternate names (SAN). Before you create the certificates, review these requirements:
2828

@@ -210,7 +210,7 @@ $AzLCerts = @(
210210

211211
### Management endpoint
212212

213-
Here's an an example on how to create certificates for securing the management endpoint:
213+
Here's an example of how to create certificates for securing the management endpoint:
214214

215215
> [!NOTE]
216216
> Run this script on a domain-joined machine using an account with Domain Administrator access to issue certificates.
@@ -310,7 +310,7 @@ These checks confirm that the certificates and chain for these endpoints haven
310310

311311
You have a helper method in the **OperationsModule** that can help you populate these parameters.
312312

313-
Here's an example on how to populate the required parameters:
313+
Here's an example of how to populate the required parameters:
314314

315315
```powershell
316316
$oidcCertChain = Get-CertificateChainFromEndpoint -endpoint 'https://adfs.azurestack.local'

0 commit comments

Comments
 (0)