Skip to content

Commit 95c571d

Browse files
committed
Updated text
1 parent 7bf90d5 commit 95c571d

File tree

4 files changed

+80
-82
lines changed

4 files changed

+80
-82
lines changed

azure-local/concepts/telemetry-and-diagnostics-overview.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 07/31/2025
1212

1313
[!INCLUDE [applies-to](../includes/hci-applies-to-23h2-22h2.md)]
1414

15-
This article provides a brief overview, benefits, and available options for the telemetry and diagnostics extension used for your Azure Local.
15+
This article gives an overview, lists benefits, and describes options for the telemetry and diagnostics extension in Azure Local.
1616

1717
## About the extension
1818

@@ -54,31 +54,31 @@ Repair Description: N/A
5454

5555
## Benefits
5656

57-
Some of the advantages of the telemetry and diagnostics extension include:
57+
Some advantages of the telemetry and diagnostics extension include:
5858

59-
- **Improved compliance:** Enables the telemetry and diagnostics data to comply with regional service and data residency requirements during data uploads.
60-
61-
- **Simplified log gathering and faster case resolution:** Lets you easily collect diagnostics logs. These logs are used by Microsoft Support and engineering team to resolve any system issues quickly.
59+
- **Improved compliance:** Lets telemetry and diagnostics data comply with regional service and data residency requirements during data uploads.
6260

63-
- **Reduced update impact:** Allows nondisruptive update of your Azure Local instance and doesn't require a reboot of the host machine.
61+
- **Simplified log gathering and faster case resolution:** Lets you easily collect diagnostics logs. Microsoft Support and the engineering team use these logs to fix system issues quickly.
6462

65-
- **Resource consumption controls:** Ensures that no more than 5% CPU is consumed. Control of the process is enforced via the Azure Arc extension framework.
63+
- **Reduced update impact:** Lets you update your Azure Local instance without disruption and doesn't require a reboot of the host machine.
64+
65+
- **Resource consumption controls:** Makes sure that no more than 5 percent CPU is used. The Azure Arc extension framework enforces control of the process.
6666

6767
## Prerequisites
6868

69-
To use the telemetry and diagnostics extension, you must have an Azure Local instance deployed and running.
69+
To use the telemetry and diagnostics extension, make sure you have an Azure Local instance is deployed and running.
7070

7171
## Data collection consent
7272

7373
Microsoft collects data in accordance with its [standard privacy practices](https://privacy.microsoft.com/). The new telemetry agent doesn't override your existing control setting.
7474

7575
If you withdraw your consent for data collection, any data collected before withdrawal isn't affected. Microsoft continues to handle and use the data collected in accordance with the terms that were in place at the time of the data collection.
7676

77-
Here are a couple of things to consider with data collection:
77+
Consider these points about data collection:
7878

79-
- Understand how Microsoft handles and uses your data. Review Microsoft's privacy practices and policies.
79+
- Learn how Microsoft handles and uses your data. Review Microsoft's privacy practices and policies.
8080

81-
- Understand the implications of consenting to data collection and the withdrawal of consent. Consult with legal or privacy professionals to ensure complete understanding.
81+
- Learn the implications of consenting to data collection and withdrawing consent. Consult legal or privacy professionals to make sure you understand.
8282

8383
### Data privacy considerations
8484

@@ -103,13 +103,13 @@ To collect and send diagnostic logs to Microsoft using the Azure portal, follow
103103
1. In the left pane, under **Settings**, select **Diagnostics and Remote Support**.
104104
1. Select **Send logs**.
105105
1. In the Diagnostics pane, set your **Log start time** and **Log end time**.
106-
1. Click the **Collect and upload logs** button.
106+
1. Select the **Collect and upload logs** button.
107107

108108
:::image type="content" source="../concepts/media/telemetry-and-diagnostics-overview/send-logs-azure-portal.png" alt-text="Screenshot of the steps to collect and send diagnostics logs via the Azure portal." lightbox="../concepts/media/telemetry-and-diagnostics-overview/send-logs-azure-portal.png":::
109109

110110
## Support operations
111111

112-
You can grant remote access to Microsoft support by using remote support operations. After enabling remote support, assign a specific access level to Microsoft support based on your requirements. For more information, see [Enable remote support diagnostics](../manage/get-remote-support.md#enable-remote-support-diagnostics) and the [List of Microsoft support operations](../manage/remote-support-arc-extension.md#list-of-microsoft-support-operations).
112+
You can grant remote access to Microsoft support by using remote support operations. After you enable remote support, assign a specific access level to Microsoft support based on your requirements. For more information, see [Enable remote support diagnostics](../manage/get-remote-support.md#enable-remote-support-diagnostics) and the [List of Microsoft support operations](../manage/remote-support-arc-extension.md#list-of-microsoft-support-operations).
113113

114114
## Next step
115115

azure-local/manage/arc-extension-management.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 07/31/2025
1313

1414
[!INCLUDE [applies-to](../includes/hci-applies-to-23h2-22h2.md)]
1515

16-
This article describes how to install, upgrade, and manage Azure Arc extensions on Azure Local.
16+
This article explains how to install, upgrade, and manage Azure Arc extensions on Azure Local.
1717

1818
## Customer-managed Azure Arc extensions on Azure Local
1919

@@ -27,11 +27,11 @@ Here are the individual extensions you can install and manage.
2727

2828
## Azure-managed extensions in Azure Local
2929

30-
Once you've successfully registered your new Azure Local with Azure, Azure-managed extensions are automatically installed on your system. These extensions are essential for the functionality and quality of your system and can't be uninstalled. You can manage the behavior of these extensions in the Azure portal by navigating to the **Extensions** page and selecting the **Settings** menu.
30+
After you successfully register your new Azure Local with Azure, Azure-managed extensions automatically install on your system. These extensions are essential for your system's functionality and quality, and you can't uninstall them. You can manage extension behavior in the Azure portal on the **Extensions** page by selecting the **Settings** menu.
3131

3232
If you have an existing Azure Local that is registered to Azure without these extensions, a banner shows on the **Overview** or **Extensions** page in the Azure portal. You can use the information in the banner to guide you through installing these extensions.
3333

34-
Here are the Azure-managed extensions:
34+
Azure-managed extensions include:
3535

3636
- [Telemetry and diagnostics](../concepts/telemetry-and-diagnostics-overview.md)
3737
- [Remote Support Arc extension](../manage/remote-support-arc-extension.md)
@@ -40,19 +40,19 @@ Here are the Azure-managed extensions:
4040

4141
### [Azure portal](#tab/azureportal)
4242

43-
You can install extensions from the **Capabilities** tab for your Azure Local Arc-enabled servers as shown in the screenshot. You can use the capabilities tab to install most extensions.
43+
You can install extensions from the **Capabilities** tab for your Azure Local Arc-enabled servers, as shown in the screenshot. You can use the capabilities tab to install most extensions.
4444

4545
:::image type="content" source="media/arc-extension-management/arc-extension-overview.png" alt-text="Screenshot of the Capabilities tab and options in the Azure portal." lightbox="media/arc-extension-management/arc-extension-overview.png":::
4646

47-
When you install an extension in the Azure portal, it's a cluster-aware operation. The extension is installed on all nodes of the system. If you add more nodes to your system, all the extensions installed on your system are automatically added to the new servers.
47+
Installing an extension in the Azure portal is a cluster-aware operation. The extension installs on all nodes of the system. If you add more nodes to your system, all installed extensions are automatically added to the new servers.
4848

4949
### [Azure CLI](#tab/azurecli)
5050

51-
Azure CLI is available to install in Windows, macOS, and Linux environments. It can also be run in Azure Cloud Shell. For more information, refer [Quickstart for Azure Cloud Shell](/azure/cloud-shell/quickstart).
51+
Azure CLI is available to install in Windows, macOS, and Linux environments. You can also run it in Azure Cloud Shell. For more information, refer [Quickstart for Azure Cloud Shell](/azure/cloud-shell/quickstart).
5252

53-
Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to install an extension following these steps:
53+
Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to install an extension by following these steps:
5454

55-
1. Set up parameters from your subscription, resource group, and clusters
55+
1. Set up parameters for your subscription, resource group, and clusters.
5656

5757
```azurecli
5858
subscription="00000000-0000-0000-0000-000000000000" # Replace with your subscription ID
@@ -63,7 +63,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to install an
6363
clusters=($(az graph query -q "resources | where type == 'microsoft.azurestackhci/clusters'| where resourceGroup =~ '${resourceGroup}' | project name" | jq -r '.data[].name'))
6464
```
6565
66-
1. To install the Windows Admin Center extension on all the systems under the resource group, run the following command:
66+
1. Install the Windows Admin Center extension on all the systems under the resource group by running the following command:
6767
6868
```azurecli
6969
extensionName="AdminCenter"
@@ -93,7 +93,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to install an
9393
done
9494
```
9595
96-
1. To install the Azure Monitor Agent extension on all the systems under the resource group, run the following command:
96+
1. Install the Azure Monitor Agent extension on all the systems under the resource group by running the following command:
9797
9898
```azurecli
9999
extensionName="AzureMonitorWindowsAgent"
@@ -114,7 +114,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to install an
114114
done
115115
```
116116
117-
1. To install the Azure Site Recovery extension on all the systems under the resource group, run the following command:
117+
1. Install the Azure Site Recovery extension on all the systems under the resource group by running the following command:
118118
119119
```azurecli
120120
asrSubscription="00000000-0000-0000-0000-000000000000" # Replace with your ASR subscription ID
@@ -149,11 +149,11 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to install an
149149
150150
### [Azure PowerShell](#tab/azurepowershell)
151151
152-
Azure PowerShell can be run in Azure Cloud Shell. This document details how to use PowerShell in Azure Cloud Shell. For more information, refer [Quickstart for Azure Cloud Shell](/azure/cloud-shell/quickstart).
152+
Run Azure PowerShell in Azure Cloud Shell. This article details how to use PowerShell in Azure Cloud Shell. For more information, see [Quickstart for Azure Cloud Shell](/azure/cloud-shell/quickstart).
153153
154-
Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to install an extension following these steps:
154+
Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to install an extension by following these steps:
155155
156-
1. Set up parameters from your subscription, resource group, and clusters:
156+
1. Set up parameters for your subscription, resource group, and clusters.
157157
158158
```powershell
159159
$subscription = "00000000-0000-0000-0000-000000000000" # Replace with your subscription ID
@@ -163,7 +163,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to insta
163163
$clusters = Get-AzResource -ResourceType "Microsoft.AzureStackHCI/clusters" -ResourceGroupName ${resourceGroup} | Select-Object -Property Name
164164
```
165165
166-
1. To install the Windows Admin Center extension on all the systems under the resource group, run the following command:
166+
1. Install the Windows Admin Center extension on all the systems under the resource group by running the following command:
167167
168168
```powershell
169169
$extensionName = "AdminCenter"
@@ -200,7 +200,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to insta
200200
}
201201
```
202202
203-
1. To install the Azure Monitor Agent extension on all the systems under the resource group, run the following command:
203+
1. Install the Azure Monitor Agent extension on all the systems under the resource group by running the following command:
204204
205205
```powershell
206206
$extensionName = "AzureMonitorWindowsAgent"
@@ -222,7 +222,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to insta
222222
}
223223
```
224224
225-
1. To install the Azure Site Recovery extension on all the systems under the resource group, create a JSON parameter file and then run the following command:
225+
1. Install the Azure Site Recovery extension on all the systems under the resource group, create a JSON parameter file, and then run the following command:
226226
227227
```powershell
228228
$settings = @{
@@ -272,9 +272,9 @@ You can check the status of an extension on each server from the **Extensions**
272272
273273
Azure CLI is available to install in Windows, macOS, and Linux environments. It can also be run in Azure Cloud Shell. For more information, refer [Quickstart for Azure Cloud Shell](/azure/cloud-shell/quickstart).
274274
275-
Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to check the status of an extension following these steps:
275+
Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to check the status of an extension by following these steps:
276276
277-
1. Set up parameters from your subscription, resource group, cluster name, and extension name
277+
1. Set up parameters for your subscription, resource group, cluster name, and extension name.
278278
279279
```azurecli
280280
subscription="00000000-0000-0000-0000-000000000000" # Replace with your subscription ID
@@ -295,7 +295,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to check the s
295295
-o table
296296
```
297297
298-
1. To filter out a specific extension like `AzureMonitorWindowsAgent`, run the following command:
298+
1. To filter out a specific extension, like `AzureMonitorWindowsAgent`, run the following command:
299299
300300
```azurecli
301301
az stack-hci extension list \
@@ -310,7 +310,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use Bash to check the s
310310
311311
Azure PowerShell can be run in Azure Cloud Shell. This document details how to use PowerShell in Azure Cloud Shell. For more information, refer [Quickstart for Azure Cloud Shell](/azure/cloud-shell/quickstart).
312312
313-
Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to check the status of an extension following these steps:
313+
Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to check the status of an extension by following these steps:
314314
315315
1. Set up parameters from your subscription, resource group, and cluster name
316316
@@ -322,7 +322,7 @@ Launch [Azure Cloud Shell](https://shell.azure.com/) and use PowerShell to check
322322
$clusters = Get-AzResource -ResourceType "Microsoft.AzureStackHCI/clusters" -ResourceGroupName ${resourceGroup} | Select-Object -Property Name
323323
```
324324
325-
1. To list all the extensions on a system, run the following command:
325+
1. List all the extensions on a system by running the following command:
326326
327327
```powershell
328328
foreach ($cluster in $clusters) {
@@ -410,7 +410,7 @@ New-AzStackHciExtension `
410410

411411
### Manual extension upgrade via the Azure portal
412412

413-
The manual extension upgrade works like the [Automatic extension upgrade](/azure/azure-arc/servers/manage-automatic-vm-extension-upgrade?tabs=azure-portal#how-does-automatic-extension-upgrade-work). On an Azure Local Arc-enabled cluster, when you manually upgrade an extension, Azure saves the version you've selected. Azure then attempts to upgrade the extension on all nodes in the cluster to that version. Make sure that [extensions are supported for manual upgrade](#extensions-not-supported-for-manual-upgrade).
413+
The manual extension upgrade works like the [Automatic extension upgrade](/azure/azure-arc/servers/manage-automatic-vm-extension-upgrade?tabs=azure-portal#how-does-automatic-extension-upgrade-work). On an Azure Local Arc-enabled cluster, when you manually upgrade an extension, Azure saves the version you selected. Azure then attempts to upgrade the extension on all nodes in the cluster to that version. Make sure that [extensions are supported for manual upgrade](#extensions-not-supported-for-manual-upgrade).
414414

415415
On some servers, if the extension upgrade fails, the platform attempts to upgrade to the selected version during the next [Azure Local cloud sync](../faq.yml).
416416

@@ -431,7 +431,7 @@ To manually upgrade an extension, follow these steps:
431431

432432
#### Extensions not supported for manual upgrade
433433

434-
Updating Azure Arc extensions manually from the Azure Local Machine page via the Azure portal may result in issues during deployment. The extensions that shouldn't be updated manually are: `AzureEdgeDeviceManagement`, `AzureEdgeLifecycleManager`, and `AzureEdgeAKVBackupForWindows` as shown in the figure.
434+
Updating Azure Arc extensions manually from the Azure Local Machine page via the Azure portal might result in issues during deployment. The extensions that shouldn't be updated manually are: `AzureEdgeDeviceManagement`, `AzureEdgeLifecycleManager`, and `AzureEdgeAKVBackupForWindows` as shown in the figure.
435435

436436
:::image type="content" source="media/arc-extension-management/arc-extension-installation.png" alt-text="Screenshot of extensions that shouldn't be manually updated." lightbox="media/arc-extension-management/arc-extension-installation.png":::
437437

@@ -476,21 +476,21 @@ If multiple extension upgrades are available for a node, they might be batched t
476476

477477
### [Azure portal](#tab/azureportal)
478478

479-
If desired, you can uninstall some extensions from your Azure Local in the Azure portal. To uninstall an extension, use these steps:
479+
If needed, you can uninstall some extensions from your Azure Local in the Azure portal. To uninstall an extension, use these steps:
480480

481481
1. Go to the **Extensions page**.
482-
2. Choose the extension you want to uninstall. The uninstall button isn't available for Azure-managed extensions.
482+
1. Choose the extension you want to uninstall. The **Uninstall** button isn't available for Azure-managed extensions.
483483

484484
:::image type="content" source="media/arc-extension-management/arc-extension-uninstall-extension-1.png" alt-text="Screenshot of how to uninstall an extension in the Azure portal." lightbox="media/arc-extension-management/arc-extension-uninstall-extension-1.png":::
485485

486-
3. Select **Uninstall** from the top menu.
487-
4. Confirm the intent and select **Yes**.
486+
1. Select **Uninstall** from the top menu.
487+
1. Confirm that you want to uninstall the extension and select **Yes**.
488488

489489
:::image type="content" source="media/arc-extension-management/arc-extension-uninstall-extension-2.png" alt-text="Screenshot of the notification to uninstall an extension in the Azure portal." lightbox="media/arc-extension-management/arc-extension-uninstall-extension-2.png":::
490490

491491
### [Azure CLI](#tab/azurecli)
492492

493-
To remove a specific extension like `AzureMonitorWindowsAgent`, run the following command:
493+
To remove a specific extension, like `AzureMonitorWindowsAgent`, run the following command:
494494

495495
```azurecli
496496
extensionName="AzureMonitorWindowsAgent" # Replace with the extension name
@@ -506,7 +506,7 @@ az stack-hci extension delete \
506506

507507
### [Azure PowerShell](#tab/azurepowershell)
508508

509-
To remove a specific extension like `AzureMonitorWindowsAgent`, run the following command:
509+
To remove a specific extension, like `AzureMonitorWindowsAgent`, run the following command:
510510

511511
```powershell
512512
$clusterName = "HCICluster" # Replace with your cluster name

0 commit comments

Comments
 (0)