Skip to content

Commit 8a5edc4

Browse files
authored
Merge pull request #8196 from MicrosoftDocs/main
Auto push to live 2025-02-11 02:00:02
2 parents 649e9d4 + 88b81d4 commit 8a5edc4

176 files changed

Lines changed: 987 additions & 255 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.developer.json

Lines changed: 408 additions & 0 deletions
Large diffs are not rendered by default.

support/azure/azure-storage/files/security/files-troubleshoot-smb-authentication.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot Azure Files identity-based authentication and authorization
33
description: Troubleshoot problems using identity-based authentication to connect to SMB Azure file shares and see possible resolutions.
44
ms.service: azure-file-storage
55
ms.custom: sap:Security, has-azure-ad-ps-ref, azure-ad-ref-level-one-done
6-
ms.date: 02/10/2025
6+
ms.date: 02/11/2025
77
ms.reviewer: kendownie, v-surmaini, v-weizhu
88
---
99
# Troubleshoot Azure Files identity-based authentication and authorization issues (SMB)
@@ -77,23 +77,23 @@ Second, try [mounting Azure file share with storage account key](/azure/storage/
7777

7878
Third, you can run the `Debug-AzStorageAccountAuth` cmdlet to conduct a set of basic checks on your AD configuration with the logged-on AD user. This cmdlet is supported on [AzFilesHybrid v0.1.2+ version](https://github.com/Azure-Samples/azure-files-samples/releases).
7979

80-
Sign in to Azure PowerShell interactively as an AD user that has owner permission on the target storage account:
80+
1. Sign in to Azure PowerShell interactively as an AD user that has owner permission on the target storage account:
8181

82-
```azurepowershell-interactive
83-
Connect-AzAccount
84-
```
82+
```azurepowershell-interactive
83+
Connect-AzAccount
84+
```
8585
86-
Then run the debug cmdlet:
86+
2. Run the `Debug-AzStorageAccountAuth` cmdlet:
8787
88-
```azurepowershell-interactive
89-
$ResourceGroupName = "<resource-group-name-here>"
90-
$StorageAccountName = "<storage-account-name-here>"
88+
```azurepowershell-interactive
89+
$ResourceGroupName = "<resource-group-name-here>"
90+
$StorageAccountName = "<storage-account-name-here>"
9191
92-
Debug-AzStorageAccountAuth `
93-
-StorageAccountName $StorageAccountName `
94-
-ResourceGroupName $ResourceGroupName `
95-
-Verbose
96-
```
92+
Debug-AzStorageAccountAuth `
93+
-StorageAccountName $StorageAccountName `
94+
-ResourceGroupName $ResourceGroupName `
95+
-Verbose
96+
```
9797
9898
The cmdlet performs these checks in sequence and provides guidance for failures:
9999
@@ -149,20 +149,20 @@ First, make sure that you've followed the steps to [enable Microsoft Entra Kerbe
149149

150150
Second, you can run the `Debug-AzStorageAccountAuth` cmdlet to perform a set of basic checks. This cmdlet is supported for storage accounts configured for Microsoft Entra Kerberos authentication, on [AzFilesHybrid v0.3.0+ version](https://github.com/Azure-Samples/azure-files-samples/releases).
151151

152-
Sign in to Azure PowerShell interactively as an AD user that has owner permission on the target storage account:
152+
1. Sign in to Azure PowerShell interactively as an AD user that has owner permission on the target storage account:
153153

154-
```azurepowershell-interactive
155-
Connect-AzAccount
156-
```
154+
```azurepowershell-interactive
155+
Connect-AzAccount
156+
```
157157
158-
Then run the debug cmdlet:
158+
2. Run the `Debug-AzStorageAccountAuth` cmdlet:
159159
160-
```azurepowershell-interactive
161-
$ResourceGroupName = "<resource-group-name-here>"
162-
$StorageAccountName = "<storage-account-name-here>"
160+
```azurepowershell-interactive
161+
$ResourceGroupName = "<resource-group-name-here>"
162+
$StorageAccountName = "<storage-account-name-here>"
163163
164-
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
165-
```
164+
Debug-AzStorageAccountAuth -StorageAccountName $StorageAccountName -ResourceGroupName $ResourceGroupName -Verbose
165+
```
166166
167167
The cmdlet performs these checks in sequence and provides guidance for failures:
168168

support/azure/virtual-machines/linux/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,7 +350,7 @@
350350
- name: Unlock the encrypted disk for offline repair
351351
href: unlock-encrypted-linux-disk-offline-repair.md
352352
- name: How to display encryption settings with Resource Explorer
353-
href: /azure/virtual-machines/linux/how-to-display-encryption-settings-with-azure-resource-explorer.md
353+
href: how-to-display-encryption-settings-with-azure-resource-explorer.md
354354
- name: FAQ
355355
href: /azure/virtual-machines/linux/disk-encryption-faq?context=/troubleshoot/azure/virtual-machines/linux/context/context
356356

support/azure/virtual-machines/windows/unexpected-vm-reboot-root-cause-analysis.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ services: virtual-machines
55
ms.service: azure-virtual-machines
66
ms.workload: infrastructure-services
77
ms.topic: how-to
8-
ms.date: 11/17/2023
9-
ms.reviewer: tagangwa, macla, v-weizhu
8+
ms.date: 02/11/2025
9+
ms.reviewer: tagangwa, macla, sinhamanisha, v-weizhu
1010
ms.custom: sap:VM restarted or stopped unexpectedly
1111
---
1212
# How to check Root Cause Analysis of unexpected Azure virtual machine reboots
@@ -17,6 +17,8 @@ Azure provides methods to access detailed Root Cause Analysis (RCA) of unexpecte
1717

1818
## Method 1: Check resource health
1919

20+
Azure Resource Health monitors the health of Azure resources and provides insights for troubleshooting. In cloud environments where direct access to servers or infrastructure is impossible, Resource Health is important to reduce troubleshooting efforts. Its main purpose is to help quickly identify if the root cause of a problem is within your application or due to an event within the Azure platform, thus making issue resolution more efficient and minimizing downtime. To understand the cause of an unexpected VM reboot scenario using Resource Health, follow these steps:
21+
2022
1. Navigate to the impacted VM in the Azure portal.
2123
2. Go to the **Help** section and then select **Resource health**.
2224
3. Check the health events for the unexpected VM reboot to get RCA information.

support/developer/dotnet/framework/general/applications-crash-at-startup.md renamed to support/developer/dotnet/framework/installation/applications-crash-at-startup.md

File renamed without changes.

support/developer/dotnet/framework/general/cannot-run-programs-after-upgrade.md renamed to support/developer/dotnet/framework/installation/cannot-run-programs-after-upgrade.md

File renamed without changes.

support/developer/dotnet/framework/general/determine-dotnet-versions-service-pack-levels.md renamed to support/developer/dotnet/framework/installation/determine-dotnet-versions-service-pack-levels.md

File renamed without changes.

support/developer/dotnet/framework/general/install-pfx-file-using-x509certificate.md renamed to support/developer/dotnet/framework/installation/install-pfx-file-using-x509certificate.md

File renamed without changes.

support/developer/dotnet/framework/general/manifest-definitions-do-not-match-reference.md renamed to support/developer/dotnet/framework/installation/manifest-definitions-do-not-match-reference.md

File renamed without changes.

support/developer/dotnet/framework/general/media/determine-dotnet-versions-service-pack-levels/registry-editor.png renamed to support/developer/dotnet/framework/installation/media/determine-dotnet-versions-service-pack-levels/registry-editor.png

File renamed without changes.

0 commit comments

Comments
 (0)