Skip to content

Commit 9743e6d

Browse files
authored
Merge pull request #7541 from MicrosoftDocs/main
Auto push to live 2024-10-23 02:00:02
2 parents 27b1575 + b9d50f1 commit 9743e6d

15 files changed

Lines changed: 401 additions & 202 deletions

File tree

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12339,6 +12339,11 @@
1233912339
"source_path": "support/dynamics-365/sales/sorry-something-went-wrong-while-initializing-the-app-error.md",
1234012340
"redirect_url": "/troubleshoot/dynamics-365/sales/errors-when-opening-365-app-outlook",
1234112341
"redirect_document_id": false
12342+
},
12343+
{
12344+
"source_path": "support/mem/configmgr/setup-migrate-backup-recovery/site-system-installation-account-used-for-db-connection.md",
12345+
"redirect_url": "/troubleshoot/mem/configmgr/welcome-configuration-manager",
12346+
"redirect_document_id": false
1234212347
}
1234312348
]
1234412349
}

support/azure/azure-kubernetes/create-upgrade-delete/error-code-invalidparameter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshoot the InvalidParameter error code
33
description: Learn how to troubleshoot the InvalidParameter error when you try to create and deploy an Azure Kubernetes Service (AKS) cluster.
4-
ms.date: 03/22/2022
4+
ms.date: 10/22/2024
55
editor: v-jsitser
66
ms.reviewer: rissing, chiragpa, erbookbi, v-leedennis
77
ms.service: azure-kubernetes-service

support/azure/azure-kubernetes/create-upgrade-delete/error-code-serviceprincipalvalidationclienterror.md

Lines changed: 26 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,8 @@
11
---
22
title: Troubleshoot the ServicePrincipalValidationClientError error code
33
description: Learn how to troubleshoot the ServicePrincipalValidationClientError error when you try to create and deploy an Azure Kubernetes Service (AKS) cluster.
4-
ms.date: 03/22/2022
5-
editor: v-jsitser
6-
ms.reviewer: rissing, chiragpa, erbookbi, v-leedennis
4+
ms.date: 10/23/2024
5+
ms.reviewer: rissing, chiragpa, erbookbi, momajed, v-leedennis, v-weizhu
76
ms.service: azure-kubernetes-service
87
#Customer intent: As an Azure Kubernetes user, I want to troubleshoot the ServicePrincipalValidationClientError error code so that I can successfully create and deploy an Azure Kubernetes Service (AKS) cluster.
98
ms.custom: sap:Create, Upgrade, Scale and Delete operations (cluster or nodepool)
@@ -52,14 +51,28 @@ The secret that's provided for the highlighted service principal isn't valid.
5251

5352
## Solution 1: Reset the service principal secret
5453

55-
Reset the secret that's used for the service principal by running the [az ad sp credential reset](/cli/azure/ad/sp/credential#az-ad-sp-credential-reset) command:
54+
To resolve this issue, reset the service principal secret by using one of the following methods:
55+
56+
- Reset the service principal's credential by running the [az ad sp credential reset](/cli/azure/ad/sp/credential#az-ad-sp-credential-reset) command:
57+
58+
```azurecli-interactive
59+
az ad sp credential reset --name "01234567-89ab-cdef-0123-456789abcdef" --query password --output tsv
60+
```
61+
62+
- Specify the expiration date by running the following command:
63+
64+
```azurecli-interactive
65+
az ad sp credential reset --name <service-principal-name> --credential-description "New secret for AKS" --years 1
66+
```
67+
68+
The preceding command resets the secret and displays it as output. Then, you can specify the new secret when you try to create the new cluster again.
69+
70+
For failed operations in an existing cluster, ensure that you update your AKS cluster with the new secret:
5671

5772
```azurecli-interactive
58-
az ad sp credential reset --name "01234567-89ab-cdef-0123-456789abcdef" --query password --output tsv
73+
az aks update-credentials --resource-group <resource-group> --name <aks-cluster> --reset-service-principal --client-secret <new-client-secret>
5974
```
6075

61-
This command resets the secret, and displays it as output. Then, you can specify the new secret when you try again to create the new cluster.
62-
6376
## Solution 2: Create a new service principal
6477

6578
You can create a new service principal and get the secret that's associated with it by running the [az ad sp create-for-rbac](/cli/azure/ad/sp#az-ad-sp-create-for-rbac) command:
@@ -81,6 +94,12 @@ The output of the command should resemble the following JSON string:
8194

8295
Note the `appId` and `password` values that are generated. After you get these values, you can rerun the cluster creation command for the new service principal and secret.
8396

97+
To update your AKS cluster with the new service principal's credential, run the following command:
98+
99+
```azurecli-interactive
100+
az aks update-credentials --resource-group <resource-group> --name <aks-cluster> --service-principal <new-client-id> --client-secret <new-client-secret>
101+
```
102+
84103
## More information
85104

86105
- [General troubleshooting of AKS cluster creation issues](troubleshoot-aks-cluster-creation-issues.md)

support/azure/virtual-machines/windows/debug-customscriptextension-runcommand-scripts.md

Lines changed: 25 additions & 106 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Debug PowerShell scripts run by Custom Script Extension or Run Command
33
description: Troubleshoot PowerShell script failures when you run them remotely on a virtual machine by using the Custom Script Extension or Run Command feature.
4-
ms.date: 03/15/2022
5-
ms.reviewer: clandis, v-leedennis
4+
ms.date: 10/23/2024
5+
ms.reviewer: clandis, kegregoi, v-leedennis, v-weizhu
66
editor: v-jsitser
77
ms.service: azure-virtual-machines
88
ms.custom: sap:VM Admin - Windows (Guest OS), devx-track-azurepowershell
@@ -121,76 +121,31 @@ wevtutil set-log "Microsoft-Windows-PowerShell/Operational" /ms:104857600
121121

122122
### Turn on process creation auditing
123123

124-
Use the [auditpol set](/windows-server/administration/windows-commands/auditpol-set) command, [New-Item](/powershell/module/microsoft.powershell.management/new-item) cmdlet, and [New-ItemProperty](/powershell/module/microsoft.powershell.management/new-itemproperty) cmdlet to turn on process creation auditing:
124+
Use the following command to turn on process creation auditing:
125125

126-
```powershell
127-
auditpol /set /category:"detailed tracking" /success:enable /subcategory:"Process Creation"
128-
129-
$registryPath = @{
130-
Path = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit'
131-
}
132-
New-Item @registryPath
133-
134-
$forceDwordOne = @{
135-
PropertyType = 'DWord'
136-
Value = 1
137-
Force = $True
138-
}
139-
New-ItemProperty @registryPath -Name 'ProcessCreationIncludeCmdLine_Enabled' @forceDwordOne
126+
```console
127+
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v "ProcessCreationIncludeCmdLine_Enabled" /t REG_DWORD /d 1 /f
140128
```
141129

142130
### Turn on PowerShell transcription
143131

144-
```powershell
145-
$registryPath = @{
146-
Path = 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\Transcription'
147-
Force = $True
148-
}
149-
New-Item @registryPath
150-
151-
$dwordOne = @{
152-
PropertyType = 'DWord'
153-
Value = 1
154-
}
155-
New-ItemProperty @registryPath -Name 'EnableTranscripting' @dwordOne
156-
New-ItemProperty @registryPath -Name 'EnableInvocationHeader' @dwordOne
157-
New-ItemProperty @registryPath -Name 'OutputDirectory' -PropertyType 'String' -Value 'C:\Transcripts'
132+
```console
133+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\Transcription" /v "EnableTranscripting" /t REG_DWORD /d 1 /f
134+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\Transcription" /v "EnableInvocationHeader" /t REG_DWORD /d 1 /f
135+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\Transcription" /v "OutputDirectory" /t REG_SZ /d C:\Transcripts /f
158136
```
159137

160138
### Turn on PowerShell module logging
161139

162-
```powershell
163-
$moduleLoggingPath = @{
164-
Path = 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging'
165-
}
166-
New-Item @moduleLoggingPath
167-
168-
$forceDwordOne = @{
169-
PropertyType = 'DWord'
170-
Value = 1
171-
Force = $True
172-
}
173-
New-ItemProperty @moduleLoggingPath -Name 'EnableModuleLogging' @forceDwordOne
174-
175-
$moduleNamesPath = 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging\ModuleNames'
176-
New-Item -Path $moduleNamesPath
177-
New-ItemProperty -Path $moduleNamesPath -Name '*' -PropertyType String -Value '*'
140+
```console
141+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging" /v "EnableModuleLogging" /t REG_DWORD /d 1 /f
142+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging\ModuleNames" /v "*" /t REG_SZ /d *
178143
```
179144

180145
### Turn on PowerShell script block logging
181146

182-
```powershell
183-
$registryPath = @{
184-
Path = 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging'
185-
}
186-
New-Item @registryPath
187-
188-
$forceDwordOne = @{
189-
PropertyType = 'DWord'
190-
Value = 1
191-
Force = $True
192-
}
193-
New-ItemProperty @registryPath -Name 'EnableScriptBlockLogging' @forceDwordOne
147+
```console
148+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" /v "EnableScriptBlockLogging" /t REG_DWORD /d 1 /f
194149
```
195150

196151
## Understand the output
@@ -294,65 +249,29 @@ To undo the changes that you made to enable the logging of PowerShell scripting
294249
295250
1. Turn off process creation auditing:
296251
297-
```powershell
298-
auditpol /set /category:"detailed tracking" /success:disable /subcategory:"Process Creation"
299-
$commandSettings = @{
300-
Path = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit'
301-
Name = 'ProcessCreationIncludeCmdLine_Enabled'
302-
PropertyType = 'DWord'
303-
Value = 0
304-
Force = $True
305-
}
306-
New-ItemProperty @commandSettings
252+
```console
253+
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v "ProcessCreationIncludeCmdLine_Enabled" /t REG_DWORD /d 0 /f
307254
```
308255
309256
1. Turn off transcription:
310257
311-
```powershell
312-
$registryPath = @{
313-
Path = 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription'
314-
}
315-
$forceDwordZero = @{
316-
PropertyType = 'DWord'
317-
Value = 0
318-
Force = $True
319-
}
320-
New-ItemProperty @registryPath -Name 'EnableTranscripting' @forceDwordZero
321-
New-ItemProperty @registryPath -Name 'EnableInvocationHeader' @forceDwordZero
322-
Remove-ItemProperty @registryPath -Name 'OutputDirectory'
258+
```console
259+
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription" /v "EnableTranscripting" /t REG_DWORD /d 0 /f
260+
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription" /v "EnableInvocationHeader" /t REG_DWORD /d 0 /f
261+
reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription" /v "OutputDirectory"
323262
```
324263
325264
1. Turn off module logging:
326265
327-
```powershell
328-
$moduleLoggingPath = @{
329-
Path = 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging'
330-
}
331-
$forceDwordZero = @{
332-
PropertyType = 'DWord'
333-
Value = 0
334-
Force = $True
335-
}
336-
New-ItemProperty @moduleLoggingPath -Name 'EnableModuleLogging' @forceDwordZero
337-
338-
$moduleNamesPath = @{
339-
Path = 'HKLM:\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging\ModuleNames'
340-
}
341-
Remove-ItemProperty @moduleNamesPath -Name '*'
266+
```console
267+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ModuleLogging" /v "EnableModuleLogging" /t REG_DWORD /d 0 /f
268+
reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging\ModuleNames" /v "*"
342269
```
343270
344271
1. Turn off script block logging:
345272
346-
```powershell
347-
$registryPath = @{
348-
Path = 'HKLM:\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging'
349-
}
350-
$forceDwordZero = @{
351-
PropertyType = 'DWord'
352-
Value = 0
353-
Force = $True
354-
}
355-
New-ItemProperty @registryPath -Name 'EnableScriptBlockLogging' @forceDwordZero
273+
```console
274+
reg add "HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging" /v "EnableScriptBlockLogging" /t REG_DWORD /d 0 /f
356275
```
357276
358277
1. Remove the transcription folder:

support/developer/webapps/iis/health-diagnostic-performance/http-403-14-forbidden-webpage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: sap:Site Behavior and Performance\Runtime errors and exceptions, incl
99

1010
This article helps you resolve the "HTTP Error 403.14 - Forbidden - The web server is configured to not list the contents of this directory" error that occurs when you open an Internet Information Services (IIS) webpage.
1111

12-
_Original product version:_ &nbsp; Internet Information Services
12+
_Original product version:_ &nbsp; Internet Information Services
1313
_Original KB number:_ &nbsp; 942062
1414

1515
> [!NOTE]

support/docfx.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -217,7 +217,7 @@
217217
"power-platform/ai-builder/**/**.*": "ai-builder",
218218
"sql/**/*.md": "sql",
219219
"sql/analysis-services/**/*.md": "analysis-services",
220-
"sql/azure-sql/**/*.md": "virtual-machines-sql",
220+
"sql/azure-sql/**/*.md": "azure-vm-sql-server",
221221
"sql/reporting-services/**/*.md": "reporting-services",
222222
"developer/dotnet/**/*.md": "dotnet",
223223
"developer/visualstudio/**/*.md": "visual-studio-family",

support/mem/configmgr/setup-migrate-backup-recovery/site-system-installation-account-used-for-db-connection.md

Lines changed: 0 additions & 41 deletions
This file was deleted.

support/mem/configmgr/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -335,8 +335,6 @@ items:
335335
href: setup-migrate-backup-recovery/failed-to-find-folder-or-file-error.md
336336
- name: Function sequence error in Smsdbmon.log
337337
href: setup-migrate-backup-recovery/function-sequence-error.md
338-
- name: Site system installation account incorrectly used for database connection
339-
href: setup-migrate-backup-recovery/site-system-installation-account-used-for-db-connection.md
340338
- name: SQL Server updates must be manually installed on secondary sites
341339
href: setup-migrate-backup-recovery/sql-cus-must-be-installed-on-secondary-sites.md
342340
- name: Support policies for manual database changes

support/power-platform/power-automate/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,8 @@
136136
href: desktop-flows/console-not-show-desktop-flows.md
137137
- name: Power Automate service doesn't start automatically after restarting
138138
href: desktop-flows/windows-services-not-start-after-restart.md
139+
- name: Registration fails with RegisterFlowMachine deactivated error
140+
href: desktop-flows/verify-dataverse-process-registerflowmachine.md
139141
- name: SessionHasLoggedOff occurs during a desktop flow run connected with the cloud
140142
href: desktop-flows/session-has-logged-off-troubleshooting.md
141143
- name: 'Security update for "connect with sign-in" connections on AD domain-joined machines'

support/sql/database-engine/performance/troubleshoot-high-cpu-usage-issues.md

Lines changed: 23 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshoot high-CPU-usage issues in SQL Server
33
description: This article provides a procedure to help you fix high-CPU-usage issues on a server that is running SQL Server.
4-
ms.date: 01/25/2024
4+
ms.date: 10/23/2024
55
ms.custom: sap:SQL resource usage and configuration (CPU, Memory, Storage)
66
ms.topic: troubleshooting
77
ms.reviewer: jopilov, v-jayaramanp, v-sidong
@@ -34,24 +34,28 @@ Use one of the following tools to check whether the SQL Server process is actual
3434

3535
- You can use the following PowerShell script to collect the counter data over a 60-second span:
3636

37-
```powershell
38-
$serverName = $env:COMPUTERNAME
39-
$Counters = @(
40-
("\\$serverName" + "\Process(sqlservr*)\% User Time"), ("\\$serverName" + "\Process(sqlservr*)\% Privileged Time")
41-
)
42-
Get-Counter -Counter $Counters -MaxSamples 30 | ForEach {
43-
$_.CounterSamples | ForEach {
44-
[pscustomobject]@{
45-
TimeStamp = $_.TimeStamp
46-
Path = $_.Path
47-
Value = ([Math]::Round($_.CookedValue, 3))
48-
}
49-
Start-Sleep -s 2
50-
}
51-
}
52-
```
53-
54-
If `% User Time` is consistently greater than 90 percent (% User Time is the sum of processor time on each processor, its maximum value is 100% * (no of CPUs)), the SQL Server process is causing high CPU usage. However, if `% Privileged time` is consistently greater than 90 percent, your antivirus software, other drivers, or another OS component on the computer is contributing to high CPU usage. You should work with your system administrator to analyze the root cause of this behavior.
37+
```powershell
38+
$serverName = $env:COMPUTERNAME
39+
$Counters = @(
40+
("\\$serverName" + "\Process(sqlservr*)\% User Time"), ("\\$serverName" + "\Process(sqlservr*)\% Privileged Time")
41+
)
42+
Get-Counter -Counter $Counters -MaxSamples 30 | ForEach {
43+
$_.CounterSamples | ForEach {
44+
[pscustomobject]@{
45+
TimeStamp = $_.TimeStamp
46+
Path = $_.Path
47+
Value = ([Math]::Round($_.CookedValue, 3))
48+
}
49+
Start-Sleep -s 2
50+
}
51+
}
52+
```
53+
54+
If `% User Time` is consistently greater than 90 percent (% User Time is the sum of processor time on each processor, its maximum value is 100% * (no of CPUs)), the SQL Server process is causing high CPU usage. However, if `% Privileged time` is consistently greater than 90 percent, your antivirus software, other drivers, or another OS component on the computer is contributing to high CPU usage. You should work with your system administrator to analyze the root cause of this behavior.
55+
56+
- [Performance Dashboard](/sql/relational-databases/performance/performance-dashboard): In SQL Server Management Studio, right click **\<SQLServerInstance\>** and select **Reports** > **Standard Reports** > **Performance Dashboard**.
57+
58+
The dashboard will illustrate a graph titled **System CPU Utilization** with a bar chart. The darker color indicates the SQL Server engine CPU utilization, while the lighter color represents the overall operating system CPU utilization (see the legend on the graph for reference). Select the circular refresh button or <kbd>F5</kbd> to see updated utilization.
5559

5660
## Step 2: Identify queries contributing to CPU usage
5761

0 commit comments

Comments
 (0)