You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/configure-cache-volumes.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,10 @@ If you're enabling write-back on the external origin volume:
63
63
64
64
### Interoperability considerations
65
65
66
-
You can't use cache volumes if the following features are configured on the source or destination:
66
+
You can't use cache volumes if the following features are configured on the origin or cache:
67
+
68
+
>[!NOTE]
69
+
> File Access Logs (FAL) for cache volumes isn't currently supported. Although diagnostic settings might be available for cache volumes, enabling diagnostic settings on a cache volume to configure File Access Logs has no effect.
Copy file name to clipboardExpand all lines: articles/energy-data-services/release-notes.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,18 @@ This page is updated with the details about the upcoming release approximately a
23
23
24
24
<hrwidth = 100%>
25
25
26
+
## February 2026
27
+
### OSDU® Reservoir DMS - Generally Available
28
+
OSDU® Reservoir DMS is now generally available on Azure Data Manager for Energy.
29
+
Reservoir DMS provides:
30
+
- Standardized storage and management of reservoir engineering data—including models, grids, and simulation outputs—using OSDU-compliant schemas.
31
+
- Consistent data quality, versioning, and traceability across workflows.
32
+
- Seamless integration with simulation and analytics tools to support faster, more reliable reservoir decisions.
33
+
Reservoir DMS is enabled on all partitions of existing and new Azure Data Manager for Energy instances. The feature is available in all regions where Azure Data Manager for Energy is offered, except Indonesia Central.
34
+
35
+
### Well Delivery DMS - Deprecation Notice
36
+
OSDU Well Delivery DMS will be deprecated on Azure Data Manager for Energy with the release in the month of March. This follows the decision to deprecate the DMS in OSDU with the M26 milestone release.
37
+
26
38
## January 2026
27
39
### External Data Service - Managed identity workflows
28
40
Azure Data Manager for Energy now supports using managed identities for authentication in External Data Services (EDS) workflows. This enhancement allows you to securely connect to OSDU® compliant external data sources without the need for hardcoding credentials, improving security and simplifying management of authentication in your data integration processes. You can use either system-assigned or user-assigned managed identities to authenticate EDS workflows with supported external data sources. For more information, see [How to enable External Data Services (EDS) Preview?](how-to-enable-external-data-services.md)
Copy file name to clipboardExpand all lines: articles/iot-edge/deploy-confidential-applications.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ For more information, see [Getting started with Open Enclave for the Scalys Trus
50
50
51
51
## Develop and deploy
52
52
53
-
When you're ready to develop and deploy your confidential application, the [Microsoft Open Enclave](https://marketplace.visualstudio.com/items?itemName=ms-iot.msiot-vscode-openenclave) extension for Visual Studio Code can help. You can use either Linux or Windows as your development machine to develop modules for the TrustBox.
53
+
When you're ready to develop and deploy your confidential application, the [Open Enclave SDK](https://github.com/openenclave/openenclave) can help. You can use either Linux or Windows as your development machine to develop modules for the TrustBox.
4. The IoT Edge runtime uses AMQP by default to talk to IoT Hub. Some proxy servers block AMQP ports. If that's the case, then you also need to configure edgeAgent to use AMQP over WebSocket. Uncomment the `UpstreamProtocol` parameter.
5. Save the changes and close the editor. Apply the changes.
263
235
264
236
```bash
@@ -328,7 +300,7 @@ With the environment variables included, the module definition looks like the fo
328
300
}
329
301
```
330
302
331
-
If you included the **UpstreamProtocol** environment variable in the config.yaml file on your IoT Edge device, add that to the IoT Edge agent module definition too.
303
+
If you included the **UpstreamProtocol** environment variable in the config.toml file on your IoT Edge device, add that to the IoT Edge agent module definition too.
Copy file name to clipboardExpand all lines: articles/iot-edge/how-to-create-transparent-gateway.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,6 @@ If you don't have your own certificate authority and want to use demo certificat
88
88
89
89
1. Check the certificate meets [format requirements](how-to-manage-device-certificates.md#format-requirements).
90
90
1. If you created the certificates on a different machine, copy them to your IoT Edge device. Use a USB drive, a service like [Azure Key Vault](/azure/key-vault/general/overview), or a command like [Secure file copy](https://www.ssh.com/ssh/scp/).
91
-
1. Move the files to the preferred directory for certificates and keys: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
92
91
1. Create the certificates and keys directories and set permissions. Store your certificates and keys in the preferred `/var/aziot` directory: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
93
92
94
93
```bash
@@ -101,6 +100,7 @@ If you don't have your own certificate authority and want to use demo certificat
101
100
sudo chown aziotks:aziotks /var/aziot/secrets
102
101
sudo chmod 700 /var/aziot/secrets
103
102
```
103
+
1. Move the files to the preferred directory for certificates and keys: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
104
104
1. Change the ownership and permissions for the certificates and keys.
105
105
106
106
```bash
@@ -112,7 +112,7 @@ If you don't have your own certificate authority and want to use demo certificat
112
112
# Give aziotks ownership to private keys
113
113
# Read and write for aziotks, no permission for others
Copy file name to clipboardExpand all lines: articles/iot-operations/develop-edge-apps/howto-build-akri-connectors-vscode.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,6 +85,9 @@ Next, build the project to confirm there are no errors. Use the VS Code command
85
85
86
86
In this example, you create an HTTP/REST connector using the Rust language, build a Docker image, and then run the connector application by using the VS Code extension:
87
87
88
+
> [!IMPORTANT]
89
+
> The following example code is meant forillustrative purposes only and is not intended to be usedin production. In a production connector, you should implement robust error handling and retry logic, and ensure that any credentials used to connect to the asset are stored and used securely. A production quality connector must implement the contract described in the [Akri operator and connector contract](https://github.com/Azure/iot-operations-sdks/blob/main/doc/akri_connector/Akri%20operator%20and%20connector%20contract.md) document in the SDKs repository.
90
+
88
91
1. Press `Ctrl+Shift+P` to open the command palette and search for the **Azure IoT Operations Akri Connectors: Create a New Akri Connector** command. Create a new folder called `my-connectors` and selectit,select**Rust** as the language, and enter a name for the connector like `rest_connector`.
89
92
90
93
1. The extension creates a new workspace named by using the connector name you chose in the previous step. The workspace includes the scaffolding fora connector writtenin the Rust language. There are `Implement` tags in the comments to help you write your own custom Akri connector. For testing purposes, you can try out the connector with just the scaffolding code. To see logs from your connector crate, replace the tag `sample_connector_scaffolding` with your connector name in the `DEFAULT_LOG_LEVEL` variable in the `main.rs` file.
Copy file name to clipboardExpand all lines: articles/iot-operations/develop-edge-apps/overview-akri-connectors.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,7 @@ For more information about Akri services and how they relate to Azure IoT Operat
21
21
Understanding these core concepts is essential for developing custom Akri connectors:
22
22
23
23
-**Akri connector**: A custom software component that acts as a protocol adapter, enabling Azure IoT Operations to discover, connect to, and communicate with physical devices. The connector translates between device-specific protocols and the standardized Azure IoT Operations data model.
24
+
-**Akri operator and connector contract**: A defined interface and set of requirements that connectors must implement to ensure compatibility with Akri services and Azure IoT Operations. This contract specifies how connectors should handle configuration, device discovery, data exchange, and communication with other platform components. TO learn more, see the [Akri operator and connector contract](https://github.com/Azure/iot-operations-sdks/blob/main/doc/akri_connector/Akri%20operator%20and%20connector%20contract.md)
24
25
-**Connector metadata**: A JSON file that describes the connector's configuration options, capabilities, and UI schemas. The metadata defines how the connector appears and behaves when you:
25
26
- Create connector template instances in the Azure portal.
26
27
- Configure devices and assets in the operations experience UI.
@@ -43,6 +44,7 @@ The development and deployment of Akri connectors follows a structured workflow
43
44
-**Build the connector**: Use the Azure IoT Operations SDK, templates, or VS Code extension to develop connector logic that implements:
44
45
- Connectivity to a physical device.
45
46
- Authentication to a physical device.
47
+
- Configuration management based on the connector contract.
46
48
- Data exchange with the physical device.
47
49
- Optionally, device and asset discovery.
48
50
- Delivery of the data to a destination in the cluster.
@@ -97,3 +99,4 @@ Akri connectors integrate seamlessly with the broader Azure IoT Operations envir
97
99
-[What are Akri services?](../discover-manage-assets/overview-akri.md)
98
100
-[Build and deploy Akri connectors](howto-develop-akri-connectors.md)
99
101
-[Build Akri connectors with the VS Code extension](howto-build-akri-connectors-vscode.md)
102
+
-[Akri operator and connector contract](https://github.com/Azure/iot-operations-sdks/blob/main/doc/akri_connector/Akri%20operator%20and%20connector%20contract.md)
Copy file name to clipboardExpand all lines: articles/iot-operations/troubleshoot/known-issues.md
+16Lines changed: 16 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -93,6 +93,22 @@ If you create a `RegistryEndpoint` resource using bicep and reference it in the
93
93
94
94
Workaround: Don't use `RegistryEndpoint` resources with Akri connectors. Instead, specify the registry information in the `ContainerRegistry` settings in the `ConnectorTemplate` resource.
95
95
96
+
### Akri error when updating or deleting an Azure IoT Operations instance
97
+
98
+
---
99
+
100
+
Issue ID: 9347
101
+
102
+
---
103
+
104
+
Fixed in version 1.2.154 (2512) and later
105
+
106
+
---
107
+
108
+
Users may encounter an error regarding expired webhook certificates with Akri when deleting/upgrading instances of Azure IoT Operations or performing CRUD operations on Akri resources such as *Connector* and *ConnectorTemplates* instances.
109
+
110
+
Workaround: run `kubectl delete pod -n azure-iot-operations aio-akri-webhook-0 --ignore-not-found` to delete and restart the webhook pods to enable the pod to pick up the new certificate.
111
+
96
112
## Connector for OPC UA issues
97
113
98
114
This section lists current known issues for the connector for OPC UA.
Copy file name to clipboardExpand all lines: articles/migrate/discovered-metadata.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -298,8 +298,12 @@ Published date | `apt-get -s dist-upgrade, yum -q check-update, zypper list-upda
298
298
299
299
> [!NOTE]
300
300
> If your Red Hat Enterprise Linux (RHEL) servers use `yum` and aren't patched regularly, pending updates data can consume storage in the cache under `var\tmp\yum\-<username>`. To manage disk space, it is recommended to clear the cache regularly.
301
-
>
302
-
> To disable discovery of pending updates, visit 'HKLM:\SOFTWARE\Microsoft\AzureAppliance' and set the registry of type 'REG_DWORD EnablePendingUpdatesDiscovery' to 0. You must restart the appliance after setting the registry to ensure changes are reflected. To re-enable discovery of pending updates, set the registry 'EnablePendingUpdatesDiscovery' to 1.
301
+
> [!NOTE]
302
+
> To disable discovery of pending updates:
303
+
> 1. Go to `HKLM:\SOFTWARE\Microsoft\AzureAppliance`.
304
+
> 1. Set the `EnablePendingUpdatesDiscovery` registry value (type `REG_DWORD`) to `0`.
305
+
> 1. Restart the appliance for the change to take effect. </be></br>
306
+
> To re-enable discovery of pending updates, set the `EnablePendingUpdatesDiscovery` registry value to `1` and restart the appliance.
Copy file name to clipboardExpand all lines: articles/sentinel/aws-disruption.md
+7-14Lines changed: 7 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,11 +10,11 @@ ms.topic: how-to
10
10
11
11
# Enable attack disruption actions on AWS with Microsoft Sentinel (preview)
12
12
13
-
This article describes how to configure your AWS environment so that Microsoft Sentinel can take automated actions on a user that assumes a SAML role, or on an AWS IAM account when an alert is triggered. Attack disruption uses high-confidence signals to contain compromised assets and limit the impact of attacks, including actions on identities in AWS.
13
+
This article describes how to configure your AWS environment so that Microsoft Sentinel can take automated actions on a user that assumes a SAML role, or on an AWS IAM account when an alert is triggered. Attack disruption uses high-confidence signals to contain compromised assets and limit the damage from attacks, including actions on identities in AWS.
14
14
15
15
## Prerequisites
16
16
17
-
Before you begin, ensure the following:
17
+
Before you begin, you need the following prerequisites in place:
18
18
19
19
- You have an active AWS account with administrative privileges.
20
20
- Your Microsoft Sentinel analytic workspace is connected to the unified security operations portal.
@@ -27,13 +27,11 @@ Before you begin, ensure the following:
27
27
28
28
### 1.1 Create a dedicated IAM role for Microsoft Sentinel
29
29
30
-
1.In the AWS console, go to **IAM \> Roles**.
30
+
1.[Create a new IAM role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html) in the AWS Management Console.
31
31
32
-
1. Select **Create role**.
32
+
- Select **AWS service** as the trusted entity and choose **EC2** (you'll update the trust relationship [next](#12-configure-trust-relationship)).
33
33
34
-
1. Select **AWS service** as the trusted entity and choose **EC2** (you'll update the trust relationship later).
35
-
36
-
1. Attach the following policy to the role (replace \<YOUR_ACCOUNT_ID\> as needed):
34
+
- Attach the following policy to the role (replace \<YOUR_ACCOUNT_ID\> as needed):
37
35
38
36
```json
39
37
{
@@ -50,7 +48,6 @@ Before you begin, ensure the following:
50
48
"iam:RemoveUserFromGroup",
51
49
"iam:ResetServiceSpecificCredential",
52
50
"iam:ResyncMFADevice",
53
-
"iam:RevokeSession",
54
51
"iam:DeleteUserPermissionsBoundary",
55
52
"iam:DeleteUserPolicy",
56
53
"iam:DetachUserPolicy"
@@ -61,15 +58,11 @@ Before you begin, ensure the following:
61
58
}
62
59
```
63
60
64
-
1. Name the role (for example, SentinelAttackDisruptionRole) and create it.
65
-
66
61
### 1.2 Configure trust relationship
67
62
68
-
1. In the IAM role you created, go to the **Trust relationships** tab.
69
-
70
-
1. Select **Edit trust relationship**.
63
+
Create a [custom trust policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html#roles-creatingrole-custom-trust-policy-console) for the IAM role.
71
64
72
-
1. Replace the trust policy with the following, specifying the Microsoft Sentinel integration principal (replace `<YOUR_AZURE_SUBSCRIPTION_ID>` with your actual Azure subscription ID):
65
+
Use the following trust policy, specifying the Microsoft Sentinel integration principal (replace `<YOUR_AZURE_SUBSCRIPTION_ID>` with your actual Azure subscription ID):
0 commit comments