Skip to content

Commit b51d9fd

Browse files
Merge pull request #3778 from MicrosoftDocs/main638900101862369589sync_temp
For protected branch, push strategy should use PR and merge to target branch method to work around git push error
2 parents 5d2de48 + 4e01ead commit b51d9fd

File tree

5 files changed

+13
-4
lines changed

5 files changed

+13
-4
lines changed

azure-local/manage/health-service-cluster-performance-history.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Cluster performance history
44
ms.author: alkohli
55
ms.topic: how-to
66
author: alkohli
7-
ms.date: 01/16/2025
7+
ms.date: 07/30/2025
88
---
99

1010
# Get cluster performance history
@@ -13,6 +13,8 @@ ms.date: 01/16/2025
1313
1414
The Health Service reduces the work required to get live performance and capacity information from your Storage Spaces Direct cluster. One cmdlet provides a curated list of essential metrics, which are collected efficiently and aggregated dynamically across nodes, with built-in logic to detect cluster membership. All values are real-time and point-in-time only.
1515

16+
For additional information, see [Performance history for Storage Spaces Direct](/windows-server/storage/storage-spaces/performance-history).
17+
1618
## Usage in PowerShell
1719
Use the following cmdlet to get metrics for the entire Storage Spaces Direct cluster:
1820

@@ -31,6 +33,8 @@ Get-Volume -FileSystemLabel <Label> | Get-ClusterPerformanceHistory
3133
Get-StorageNode -Name <Name> | Get-ClusterPerformanceHistory
3234
```
3335

36+
<br>For additional information on how to access performance history data using PowerShell, see [Scripting with PowerShell and Storage Spaces Direct performance history](/windows-server/storage/storage-spaces/performance-history-scripting).
37+
3438
## Usage in .NET and C#
3539
This sections shows how to connect to the Health Service, use discover objects, and implement an Observer to begin streaming metrics.
3640

138 KB
Loading

azure-local/manage/remote-support-arc-extension.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,10 @@ The Remote Support Arc extension, listed as **AzureEdgeRemoteSupport** in the Az
2121

2222
Remote support is the process where a Microsoft support professional connects to your device to help fix issues. With the extension, support personnel can securely access your system, do limited troubleshooting or repair tasks, and fix your case faster.
2323

24+
The following screenshot shows the Remote Support Arc extension in the Azure portal:
25+
26+
:::image type="content" source="media/arc-extension-management/azure-edge-remote-support/azure-edge-remote-support.png" alt-text="Screenshot of the Remote Support Arc extension in the Azure portal." lightbox="media/arc-extension-management/azure-edge-remote-support/azure-edge-remote-support.png":::
27+
2428
For more information about remote support and how to turn it on, see [Get remote support](./get-remote-support.md).
2529

2630
## Benefits

azure-local/update/import-discover-updates-offline-23h2.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,9 @@ ms.date: 07/25/2025
1616

1717
[!INCLUDE [azure-local-end-of-support-banner-23h2](../includes/azure-local-end-of-support-banner-23h2.md)]
1818

19-
This article explains how to discover and import update packages for Azure Local with limited connectivity. Starting with version 2503, the OS update components for Azure Local are distributed as a static payload, so you can import the update payload and install updates with limited connectivity to Azure.
19+
This article explains how to discover and import solution update packages for Azure Local deployed in sites with limited bandwidth connections to Azure. Beginning with version 2503, Azure Local solution updates can be optionally downloaded as static payloads. You can download the payload once, copy or transfer to multiple instances and import using PowerShell. Performing these actions prior to starting an update, reduces the amount of data that is downloaded during an update.
20+
21+
The static payload for a solution update includes the OS security update, extensions, and core agents, all of which are installed during the update process. Updated container images required for the Azure Resource Bridge component and Azure Kubernetes Service on Azure Local are not included in the static payload. These images are downloaded automatically during the update process.
2022

2123
<!--To install updates online via PowerShell, see [Update Azure Local via PowerShell](./update-via-powershell-23h2.md).-->
2224

azure-managed-lustre/amlfs-prerequisites.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article explains prerequisites that you must configure before creating an A
2121

2222
## Network prerequisites
2323

24-
Supply the virtual network and subnet for Azure Managed Lustre networking. You have full control of which network security measures you wish to apply, including which compute and other services can access Azure Managed Lustre. Ensure you follow the networking and security guidelines provided for Azure Managed Lustre. Include allowing required connections for essential services such as the Lustre protocol, engineering and diagnostic support, Azure Blob storage, and security monitoring. If your network settings disable one of the essential services, it leads to a degraded product experience or it reduces Microsoft’s support abilities.
24+
You supply the virtual network and subnet for Azure Managed Lustre networking. This gives you full control of which network security measures you wish to apply, including which compute and other services can access Azure Managed Lustre. Ensure you follow the networking and security guidelines provided for Azure Managed Lustre. Include allowing required connections for essential services such as the Lustre protocol, engineering and diagnostic support, Azure Blob storage, and security monitoring. If your network settings disable one of the essential services, it leads to a degraded product experience or it reduces Microsoft’s support abilities.
2525

2626
You can't move a file system from one network or subnet to another after you create the file system.
2727

@@ -58,7 +58,6 @@ By default, no specific changes need to be made to enable Azure Managed Lustre.
5858
| Azure cloud service access | Configure your network security group to permit the Azure Managed Lustre file system to access Azure cloud services from within the Azure Managed Lustre subnet.<br><br>Add an outbound security rule with the following properties:<br>- **Port**: Any<br>- **Protocol**: Any<br>- **Source**: Virtual Network<br>- **Destination**: "AzureCloud" service tag<br>- **Action**: Allow<br><br>Note: Configuring the Azure cloud service also enables the necessary configuration of the Azure Queue service.<br><br>For more information, see [Virtual network service tags](/azure/virtual-network/service-tags-overview). |
5959
| Lustre access<br>(TCP ports 988, 1019-1023) | Your network security group must allow inbound and outbound traffic for TCP port 988 and TCP port range 1019-1023. These rules need to be allowed between hosts on the Azure Managed Lustre subnet, and between any client subnets and the Azure Managed Lustre subnet. No other services can reserve or use these ports on your Lustre clients. The default rules `65000 AllowVnetInBound` and `65000 AllowVnetOutBound` meet this requirement. |
6060

61-
6261
For detailed guidance about configuring a network security group for Azure Managed Lustre file systems, see [Create and configure a network security group](configure-network-security-group.md#create-and-configure-a-network-security-group).
6362

6463
#### Known limitations

0 commit comments

Comments
 (0)