Skip to content

Commit d5cc622

Browse files
authored
Merge pull request #16094 from meganbradley/meganbradley/docutune-autopr-20241017-193806-8178175-ignore-build
[BULK] - DocuTune remediation - Sensitive terms with GUIDs (part 1)
2 parents 75e75d2 + a8ee1d6 commit d5cc622

19 files changed

+51
-52
lines changed

AKS-Hybrid/connect-to-arc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ Make sure the service principal used in this command has the Owner role assigned
100100
If you want to enable custom locations on your cluster along with Azure Arc, run the following command to get the object ID of the custom location application, and then connect to Azure Arc using a service principal:
101101

102102
```powershell
103-
$objectID = (Get-AzADServicePrincipal -ApplicationId "bc313c14-388c-4e7d-a58e-70017303ee3b").Id
103+
$objectID = (Get-AzADServicePrincipal -ApplicationId "00001111-aaaa-2222-bbbb-3333cccc4444").Id
104104
Enable-AksHciArcConnection -name $clusterName -subscriptionId $subscriptionId -resourceGroup $resourceGroup -credential $Credential -tenantId $tenantId -location -customLocationsOid $objectID
105105
```
106106

AKS-Hybrid/deploy-load-balancer-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Microsoft.KubernetesRuntime RegistrationRequired Registered
8383
Obtain the Application ID of the Arc extension by running [az ad sp list](/cli/azure/ad/sp#az-ad-sp-list). In order to run the following command, you must be a `user` member of your Azure tenant. For more information about user and guest membership, see [default user permissions in Microsoft Entra ID](/entra/fundamentals/users-default-permissions).
8484

8585
```azurecli
86-
$objID = az ad sp list --filter "appId eq '087fca6e-4606-4d41-b3f6-5ebdf75b8b4c'" --query "[].id" --output tsv
86+
$objID = az ad sp list --filter "appId eq '00001111-aaaa-2222-bbbb-3333cccc4444'" --query "[].id" --output tsv
8787
```
8888

8989
Once you have the $objID, you can install the MetalLB Arc extension on your Kubernetes cluster. To run the below command, you need to have [**Kubernetes extension contributor**](/azure/role-based-access-control/built-in-roles/containers#kubernetes-extension-contributor) role.

AKS-Hybrid/reference/ps/set-akshciregistration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Registers AKS hybrid with Azure.
3939
### Register AKS hybrid using a subscription ID and resource group name
4040

4141
```powershell
42-
Set-AksHciRegistration -subscriptionId 57ac26cf-a9f0-4908-b300-9a4e9a0fb205 -resourceGroupName myresourcegroup
42+
Set-AksHciRegistration -subscriptionId aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e -resourceGroupName myresourcegroup
4343
```
4444

4545
### Register with a device login or while running in a headless shell

azure-managed-lustre/create-file-system-resource-manager.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -187,23 +187,23 @@ This section shows example contents for a JSON template file. You can remove opt
187187
"identity": {
188188
"type": "UserAssigned",
189189
"userAssignedIdentities": {
190-
"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>": {}
190+
"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>": {}
191191
}
192192
},
193193
"properties": {
194194
"encryptionSettings": {
195195
"keyEncryptionKey": {
196196
"keyUrl": "https://<keyvault-name>.vault.azure.net/keys/kvk/<key>",
197197
"sourceVault": {
198-
"id": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>"
198+
"id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>"
199199
}
200200
}
201201
},
202-
"filesystemSubnet": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>",
202+
"filesystemSubnet": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>",
203203
"hsm": {
204204
"settings": {
205-
"container": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>",
206-
"loggingContainer": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>",
205+
"container": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>",
206+
"loggingContainer": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>",
207207
"importPrefixesInitial": [
208208
"/"
209209
]
@@ -247,26 +247,26 @@ resource filesystem 'Microsoft.StorageCache/amlFilesystems@2024-03-01' = {
247247
identity: {
248248
type: 'UserAssigned'
249249
userAssignedIdentities: {
250-
'/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>': {}
250+
'/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<identity-name>': {}
251251
}
252252
}
253253
properties: {
254254
encryptionSettings: {
255255
keyEncryptionKey: {
256256
keyUrl: 'https://<keyvault-name>.vault.azure.net/keys/kvk/<key>'
257257
sourceVault: {
258-
id: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>'
258+
id: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.KeyVault/vaults/<keyvault-name>'
259259
}
260260
}
261261
}
262-
filesystemSubnet: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>'
262+
filesystemSubnet: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Network/virtualNetworks/<vnet-name>/subnets/<subnet-name>'
263263
hsm: {
264264
settings: {
265-
container: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>'
265+
container: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<container-name>'
266266
importPrefixesInitial: [
267267
'/'
268268
]
269-
loggingContainer: '/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>'
269+
loggingContainer: '/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/<rg-name>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>/blobServices/default/containers/<logging-container-name>'
270270
}
271271
}
272272
maintenanceWindow: {

azure-stack/hci/manage/monitor-hci-single-23h2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ Provides health faults on a cluster.
183183
|--|--|--|--|
184184
| Fault | A short description of health faults. On clicking the link, a side panel opens with more information. | No unit | PoolCapacityThresholdExceeded |
185185
| Faulting resource type | The type of resource that encountered a fault. | No unit | StoragePool |
186-
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {1245340c-780b-4afc-af3c-f9bdc4b12f8a}: SP:{c57f23d1-d784-4a42-8b59-4edd8e70e830} |
186+
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1}: SP:{b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2} |
187187
| Severity | Severity of fault could be warning or critical. | No unit | Warning |
188188
| Initial fault time | Timestamp of when server was last updated. | Datetime | 4/9/2022, 12:15:42 PM |
189189

azure-stack/hci/manage/monitor-hci-single.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -482,7 +482,7 @@ Provides health faults on a cluster.
482482
|--|--|--|--|
483483
| Fault | A short description of health faults. On clicking the link, a side panel opens with more information. | No unit | PoolCapacityThresholdExceeded |
484484
| Faulting resource type | The type of resource that encountered a fault. | No unit | StoragePool |
485-
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {1245340c-780b-4afc-af3c-f9bdc4b12f8a}: SP:{c57f23d1-d784-4a42-8b59-4edd8e70e830} |
485+
| Faulting resource ID | Unique ID for the resource that encountered a health fault. | Unique ID | {a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1}: SP:{b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2} |
486486
| Severity | Severity of fault could be warning or critical. | No unit | Warning |
487487
| Initial fault time | Timestamp of when server was last updated. | Datetime | 4/9/2022, 12:15:42 PM |
488488

azure-stack/hci/manage/troubleshoot-arc-enabled-vms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ This section describes the errors related to Azure Arc VM management and their r
2222

2323
When trying to run the command to enable guest management, you see the following error:
2424

25-
**Error:** `Deployment failed. Correlation ID: 5d0c4921-78e0-4493-af16-dffee5cbf9d8. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
25+
**Error:** `Deployment failed. Correlation ID: aaaa0000-bb11-2222-33cc-444444dddddd. VM Spec validation failed for guest agent provisioning: Invalid managed identity. A system-assigned managed identity must be enabled in parent resource: Invalid Configuration`
2626

2727
This failure is because the managed identity wasn't created for this VM. System-assigned Managed Identity is required to enable guest management.
2828

azure-stack/hci/manage/use-datacenter-firewall-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ These files contain a sequence of flow events, for example:
322322
]
323323
},
324324
"operationName":"NetworkSecurityGroupFlowEvents",
325-
"resourceId":"394f647d-2ed0-4c31-87c5-389b8c0c8132",
325+
"resourceId":"a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1",
326326
"time":"20180719:L012620622",
327327
"category":"NetworkSecurityGroupFlowEvent",
328328
"systemId":"d8b3b697-5355-40e2-84d2-1bf2f0e0dc4a"
@@ -407,4 +407,4 @@ For related information, see:
407407

408408
- [Datacenter Firewall overview](../concepts/datacenter-firewall-overview.md).
409409
- [Network Controller overview](../concepts/network-controller-overview.md).
410-
- [SDN in Azure Stack HCI and Windows Server](../concepts/software-defined-networking.md).
410+
- [SDN in Azure Stack HCI and Windows Server](../concepts/software-defined-networking.md).

azure-stack/hci/update/update-troubleshooting-23h2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To collect logs for the update failures using PowerShell, follow these steps on
5858
PS C:\Users\lcmuser> $Failure = $Update|Get-SolutionUpdateRun
5959
PS C:\Users\lcmuser> $Failure
6060
61-
ResourceId : redmond/Solution10.2303.1.7/2c21b859-e063-4f24-a4db-bc1d6be82c4e
61+
ResourceId : redmond/Solution10.2303.1.7/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1
6262
Progress : Microsoft.AzureStack.Services.Update.ResourceProvider.UpdateService.Models.Step
6363
TimeStarted : 4/21/2023 10:02:54 PM
6464
LastUpdatedTime : 4/21/2023 3:19:05 PM
@@ -78,7 +78,7 @@ To collect logs for the update failures using PowerShell, follow these steps on
7878
Here's sample output:
7979
8080
```output
81-
PS C:\Users\lcmuser> Get-ActionplanInstance -actionplaninstanceid 2c21b859-e063-4f24-a4db-bc1d6be82c4e >log.txt
81+
PS C:\Users\lcmuser> Get-ActionplanInstance -actionplaninstanceid a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1 >log.txt
8282
8383
PS C:\Users\lcmuser>notepad log.txt
8484
```

azure-stack/includes/resource-provider-va-rotate-secrets-rotate.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,27 +26,27 @@ Open an elevated PowerShell console and complete the following steps to determin
2626

2727
```powershell
2828
PS C:\WINDOWS\system32> Get-AzsProductDeployment -AsJson
29-
VERBOSE: GET https://adminmanagement.myregion.mycompany.com/subscriptions/ze22ca96-z546-zbc6-z566-z35f68799816/providers/Microsoft.Deployment.Admin/locations/global/productDeployments?api-version=2019-01-01 with 0-char payload
29+
VERBOSE: GET https://adminmanagement.myregion.mycompany.com/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Deployment.Admin/locations/global/productDeployments?api-version=2019-01-01 with 0-char payload
3030
VERBOSE: Received 2656-char response, StatusCode = OK
3131
{
3232
"value": [
3333
{
34-
"id": "/subscriptions/ze22ca96-z546-zbc6-z566-z35f68799816/providers/Microsoft.Deployment.Admin/locations/global/productDeployments/microsoft.eventhub",
34+
"id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Deployment.Admin/locations/global/productDeployments/microsoft.eventhub",
3535
"name": "global/microsoft.eventhub",
3636
"type": "Microsoft.Deployment.Admin/locations/productDeployments",
3737
"properties": {
3838
"status": "DeploymentSucceeded",
39-
"subscriptionId": "b37ae55a-a6c6-4474-ba97-81519412adf5",
39+
"subscriptionId": "bbbb1b1b-cc2c-dd3d-ee4e-ffffff5f5f5f",
4040
"deployment": {
4141
"version": "1.2003.0.0",
42-
"actionPlanInstanceResourceId":"/subscriptions/ze22ca96-z546-zbc6-z566-z35f68799816/providers/Microsoft.Deployment.Admin/locations/global/actionplans/abcdfcd3-fef0-z1a3-z85d-z6ceb0f31e36",
42+
"actionPlanInstanceResourceId":"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Deployment.Admin/locations/global/actionplans/cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a",
4343
"parameters": {
4444
4545
}
4646
},
4747
"lastSuccessfulDeployment": {
4848
"version": "1.2003.0.0",
49-
"actionPlanInstanceResourceId":"/subscriptions/ze22ca96-z546-zbc6-z566-z35f68799816/providers/Microsoft.Deployment.Admin/locations/global/actionplans/abcdfcd3-fef0-z1a3-z85d-z6ceb0f31e36",
49+
"actionPlanInstanceResourceId":"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Deployment.Admin/locations/global/actionplans/cccc2c2c-dd3d-ee4e-ff5f-aaaaaa6a6a6a",
5050
"parameters": {
5151
5252
}
@@ -70,12 +70,12 @@ Open an elevated PowerShell console and complete the following steps to determin
7070
```powershell
7171
PS C:\WINDOWS\system32> Get-AzsProductSecret -PackageId 'microsoft.eventhub.1.2003.0.0' -AsJson
7272
VERBOSE: GET
73-
https://adminmanagement.myregion.mycompany.com/subscriptions/ze22ca96-z546-zbc6-z566-z35f68799816/providers/Microsoft.Deployment.Admin/locations/global/productPackages/microsoft.eventhub.1.2003.0.0/secrets?api-version=2019-01-01 with 0-char payload
73+
https://adminmanagement.myregion.mycompany.com/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Deployment.Admin/locations/global/productPackages/microsoft.eventhub.1.2003.0.0/secrets?api-version=2019-01-01 with 0-char payload
7474
VERBOSE: Received 617-char response, StatusCode = OK
7575
{
7676
"value": [
7777
{
78-
"id": "/subscriptions/ze22ca96-z546-zbc6-z566-z35f68799816/providers/Microsoft.Deployment.Admin/locations/global/productPackages/microsoft.eventhub.1.2003.0.0/secrets/aseh-ssl-gateway-pfx",
78+
"id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/providers/Microsoft.Deployment.Admin/locations/global/productPackages/microsoft.eventhub.1.2003.0.0/secrets/aseh-ssl-gateway-pfx",
7979
"name": "global/microsoft.eventhub.1.2003.0.0/aseh-ssl-gateway-pfx",
8080
"type": "Microsoft.Deployment.Admin/locations/productPackages/secrets",
8181
"properties": {
@@ -131,4 +131,3 @@ Open an elevated PowerShell console and complete the following steps to determin
131131
You can monitor secret rotation progress in either the PowerShell console, or in the administrator portal by selecting the resource provider in the Marketplace service:
132132

133133
[![secret-rotation-progress](media/resource-provider-va-rotate-secrets-rotate/secret-rotation-in-progress.png)](media/resource-provider-va-rotate-secrets-rotate/secret-rotation-in-progress.png#lightbox)
134-

0 commit comments

Comments
 (0)