Skip to content

Commit 555e36e

Browse files
author
Simonx Xu
authored
Merge branch 'main' into docs-editor/cannot-connect-rds-no-license-1736963868
2 parents 21f363c + eebeabb commit 555e36e

1,986 files changed

Lines changed: 6864 additions & 2484 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.developer.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5842,6 +5842,10 @@
58425842
{
58435843
"source_path": "support/developer/webapps/iis/www-administration-management/http-bad-request-response-kerberos.md",
58445844
"redirect_url": "/troubleshoot/developer/webapps/iis/www-authentication-authorization/http-bad-request-response-kerberos"
5845+
},
5846+
{
5847+
"source_path": "support/developer/webapps/iis/health-diagnostic-performance/troubleshoot-native-memory-leak-iis-7x-application-pool.md",
5848+
"redirect_url": "/troubleshoot/developer/webapps/iis/site-behavior-performance/troubleshoot-native-memory-leak-iis-7x-application-pool"
58455849
}
58465850
]
58475851
}

support/azure/automation/updates/find-azurermresource-fails.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,6 @@ Starting in Microsoft AzureRM 6.0.0, the `Find-AzureRmResource` cmdlet functiona
2525

2626
## Resolution
2727

28-
To fix this issue, update your runbooks to use `Get-AzureRmResource` instead of `Find-AzureRmResource`. For more information, see the [usage of Get-AzureRmResource](/powershell/module/azurerm.resources/get-azurermresource?view=azurermps-6.1.0&preserve-view=true).
28+
To fix this issue, update your runbooks to use `Get-AzureRmResource` instead of `Find-AzureRmResource`. For more information, see the [usage of Get-AzureRmResource](/previous-versions/powershell/module/azurerm.resources/get-azurermresource).
2929

3030
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/azure/azure-functions/monitoring/functions-monitoring-appinsightslogs.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Application Insights logs are missing or incorrect
33
description: Ths article helps you resolve issues related to missing or incorrect logs for Application Insights logs in Azure Functions.
4-
ms.date: 08/24/2023
5-
ms.reviewer: gasridha, v-jayaramanp
4+
ms.date: 01/16/2025
5+
ms.reviewer: gasridha, v-jayaramanp, agaltrai, jarrettr
66
ms.custom: sap:Monitoring using Application Insights, Metrics and Alerts
77
---
88

@@ -30,6 +30,23 @@ If the Application Insights logs are missing, or if the data appears to be parti
3030

3131
**Recommendation**: The function app should be on version 4 and the runtime version should be at least 4.15.2*xx*. This is because, from this version onwards, you can track the log flows from Azure Functions to the Application Insights service. By monitoring the log flows, you can check for missing logs.
3232

33+
## Custom application logs
34+
35+
By default, custom application logs you write are sent to the Functions host, which then sends them to Application Insights under the [Worker category](/azure/azure-functions/configure-monitoring#configure-categories). However, some language stacks allow you to send the logs directly to Application Insights, which gives you full control over how logs you write are emitted. In this case, the logging pipeline changes from `worker > Functions host > Application Insights` to `worker > Application Insights`.
36+
37+
The following table summarizes the configuration options available for each stack:
38+
39+
| Language stack | Where to configure custom logs |
40+
|-|-|
41+
| .NET (in-process model) | `host.json` |
42+
| .NET (isolated model) | Default (send custom logs to the Functions host): `host.json`<br/>To send logs directly to Application Insights, see [Configure Application Insights in the HostBuilder](/azure/azure-functions/dotnet-isolated-process-guide#application-insights). |
43+
| Node.JS | `host.json` |
44+
| Python | `host.json` |
45+
| Java | Default (send custom logs to the Functions host): `host.json`<br/>To send logs directly to Application Insights, see [Configure the Application Insights Java agent](/azure/azure-monitor/app/monitor-functions#distributed-tracing-for-java-applications). |
46+
| PowerShell | `host.json` |
47+
48+
When you configure custom application logs to be sent directly, the host no longer emits them, and `host.json` no longer controls their behavior. Similarly, the options exposed by each stack apply only to custom logs, and they don't change the behavior of the other runtime logs described in this article. In this case, to control the behavior of all logs, you might need to make changes in both configurations.
49+
3350
## Logs are missing or partial
3451

3552
Application Insights collects log, performance, and error data. [Sampling configuration](/azure/azure-functions/configure-monitoring#configure-sampling) is used to reduce the volume of telemetry. The Sampling feature is enabled by default with the settings shown in the following [host.json](/azure/azure-functions/functions-host-json#applicationinsights) example. Excluded types aren't sampled.

support/azure/azure-kubernetes/extensions/troubleshoot-failed-kubernetes-deployment-offer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ You can use the Azure CLI commands that are described in the [Azure CLI legal te
132132
133133
#### [PowerShell](#tab/PowerShell)
134134
135-
To accept the legal terms through PowerShell, run the cmdlets that are described in the [PowerShell legal terms](/powershell/module/azurerm.marketplaceordering).
135+
To accept the legal terms through PowerShell, run the cmdlets that are described in the [PowerShell legal terms](/powershell/module/az.marketplaceordering).
136136
137137
---
138138

support/azure/azure-storage/blobs/alerts/storage-explorer-troubleshooting.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,13 @@ Having to reenter credentials is most likely the result of Conditional Access po
154154

155155
To reduce the frequency of having to reenter credentials because of errors like the preceding ones, talk to your Microsoft Entra admin.
156156

157-
### Conditional access policies
157+
### Other conditional access policy issues
158158

159-
If you have conditional access policies that need to be satisfied for your account, make sure you're using the **Default Web Browser** value for the **Sign in with** setting. For information on that setting, see [Changing where sign-in happens](/azure/storage/common/storage-explorer-sign-in#changing-where-sign-in-happens).
159+
If you have other conditional access policies that need to be satisfied for your account, try using either the **Authentication Broker** or **Default Web Browser** value for the **Sign in with** setting. For information on that setting, see [Changing where sign-in happens](/azure/storage/common/storage-explorer-sign-in#changing-where-sign-in-happens).
160+
161+
### Issues with authentication broker on Windows
162+
163+
The Windows operating system uses the Web Account Manager (WAM) as its authentication broker. If you're using the **Authentication Broker** sign-in method on Windows and experience issues, see [this guide](/entra/msal/dotnet/advanced/exceptions/wam-errors) for steps to resolve common errors.
160164

161165
### Browser complains about HTTP redirect or insecure connection during sign-in
162166

support/azure/synapse-analytics/dedicated-sql/connectivity/dsql-conn-dropped-connections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The following PowerShell script downloads and runs the latest version of the Azu
3838

3939
> [!NOTE]
4040
> - To run the tests in Linux, from computers that have no Internet access, or from a containerized environment, see [SQL connectivity checker on GitHub](https://github.com/Azure/SQL-Connectivity-Checker).
41-
> - For more PowerShell commands, see [Available PowerShell commands](/powershell/module/azurerm.sql#sql).
41+
> - For more PowerShell commands, see [Available PowerShell commands](/powershell/module/az.sql#sql).
4242
4343
1. Open Windows PowerShell ISE (in **Administrator** mode if possible).
4444
> [!NOTE]

support/azure/virtual-machines/linux/how-to-use-perfInsights-linux.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ ms.author: genli
1919

2020
**Applies to:** :heavy_check_mark: Linux VMs
2121

22-
[!INCLUDE [CentOS End Of Life](../../../includes/centos-end-of-life-note.md)]
23-
2422
[PerfInsights Linux](https://aka.ms/perfinsightslinuxdownload) is a self-help diagnostics tool that collects and analyzes the diagnostic data, and provides a report to help troubleshoot Linux virtual machine performance problems in Azure. PerfInsights can be run on supported virtual machines as a standalone tool, or directly from the portal by using [Performance Diagnostics for Azure virtual machines](../windows/performance-diagnostics.md).
2523

2624
If you are experiencing performance problems with virtual machines, before contacting support, run this tool.
@@ -199,11 +197,10 @@ The following categories of rules are currently supported:
199197
| Distribution | Version |
200198
|----------------------------|-------------------------------------------------|
201199
| Oracle Linux Server | 6.10 [`*`], 7.3, 7.5, 7.6, 7.7, 7.8, 7.9 |
202-
| CentOS | 6.5 [`*`], 7.6, 7.7, 7.8, 7.9 |
203-
| RHEL | 7.2, 7.5, 8.0 [`*`], 8.1, 8.2, 8.6, 8.8 |
204-
| Ubuntu | 14.04, 16.04, 18.04, 20.04, 22.04 |
205-
| Debian | 8, 9, 10, 11 [`*`] |
206-
| SLES | 12 SP4 [`*`], 12 SP5 [`*`], 15 [`*`], 15 SP1 [`*`], 15 SP2 [`*`], 15 SP4 [`*`] |
200+
| RHEL | 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 8.0 [`*`], 8.1, 8.2, 8.4, 8.5, 8.6, 8.7, 8.8, 8.9 |
201+
| Ubuntu | 16.04, 18.04, 20.04, 22.04 |
202+
| Debian | 9, 10, 11 [`*`] |
203+
| SLES | 12 SP5 [`*`], 15 SP1 [`*`], 15 SP2 [`*`], 15 SP3 [`*`], 15 SP4 [`*`], 15 SP5 [`*`], 15 SP6 [`*`] |
207204
| AlmaLinux | 8.4, 8.5 |
208205
| Azure Linux | 2.0 |
209206

@@ -217,8 +214,6 @@ The following categories of rules are currently supported:
217214

218215
- RHEL 8 doesn't have Python installed by default because both Python 2 and Python 3.6 are available. To install Python 3.6, run the `yum install python3` command.
219216

220-
- Guest Agent information collection may fail on CentOS 6.x.
221-
222217
- PCI devices information is not collected on Debian based distributions.
223218

224219
- LVM information is partially collected on some distributions.

support/azure/virtual-machines/windows/extension-version-2.2-not-supported.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To work around this problem, use one of the following methods.
2626

2727
### Method 1
2828

29-
Revert to using the Microsoft Entra parameters in the syntax for [Set-AzureRmVmDiskEncryptionExtension](/powershell/module/azurerm.compute/set-azurermvmdiskencryptionextension?view=azurermps-6.2.0&preserve-view=true).
29+
Revert to using the Microsoft Entra parameters in the syntax for [Set-AzVMDiskEncryptionExtension](/powershell/module/az.compute/set-azvmdiskencryptionextension).
3030

3131
The parameters are the following:
3232

@@ -40,7 +40,7 @@ The parameters are the following:
4040
Opt in to the "UnifiedDiskEncryptionForVMs" feature for your subscription by running the following script before you try again to enable encryption:
4141

4242
```powershell
43-
Register-AzureRmProviderFeature -ProviderNamespace "Microsoft.Compute" -FeatureName "UnifiedDiskEncryptionForVMs" # Wait 10 minutes until state transitions to 'Registered' Register-AzureRmResourceProvider -ProviderNamespace Microsoft.Compute
43+
Register-AzProviderFeature -ProviderNamespace "Microsoft.Compute" -FeatureName "UnifiedDiskEncryptionForVMs" # Wait 10 minutes until state transitions to 'Registered' Register-AzResourceProvider -ProviderNamespace Microsoft.Compute
4444
```
4545

4646
## More Information
@@ -50,18 +50,18 @@ Register-AzureRmProviderFeature -ProviderNamespace "Microsoft.Compute" -FeatureN
5050
Run the following script:
5151

5252
```
53-
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $resourceGroupName -VMName $vmName -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All';
53+
Set-AzVMDiskEncryptionExtension -ResourceGroupName $resourceGroupName -VMName $vmName -DiskEncryptionKeyVaultUrl $diskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $keyVaultResourceId -KeyEncryptionKeyUrl $keyEncryptionKeyUrl -KeyEncryptionKeyVaultId $keyVaultResourceId -VolumeType 'All';
5454
DEBUG: 10:47:22 AM - SetAzureDiskEncryptionExtensionCommand end processing.
55-
Set-AzureRmVMDiskEncryptionExtension : Azure Disk Encryption extension version '2.2' is not supported.
55+
Set-AzVMDiskEncryptionExtension : Azure Disk Encryption extension version '2.2' is not supported.
5656
ErrorCode: NotSupported
5757
ErrorMessage: Azure Disk Encryption extension version '2.2' is not supported.
5858
StatusCode: 409
5959
ReasonPhrase: Conflict
6060
OperationID : 2cb4ac35-e2a5-4cd4-84d9-3174663e0a46
6161
At line:1 char:1
62-
+ Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $resourceGrou ...
62+
+ Set-AzVMDiskEncryptionExtension -ResourceGroupName $resourceGrou ...
6363
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
64-
+ CategoryInfo : CloseError: (:) [Set-AzureRmVMDiskEncryptionExtension], ComputeCloudException
64+
+ CategoryInfo : CloseError: (:) [Set-AzVMDiskEncryptionExtension], ComputeCloudException
6565
```
6666

6767
## Status
-15.2 KB
Loading

0 commit comments

Comments
 (0)