Skip to content

Commit 14eee4e

Browse files
Merge pull request #311996 from MicrosoftDocs/main
Auto Publish – main to live - 2026-02-19 12:00 UTC
2 parents 66cf553 + b67fd2f commit 14eee4e

15 files changed

Lines changed: 70 additions & 59 deletions

articles/azure-netapp-files/configure-cache-volumes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,10 @@ If you're enabling write-back on the external origin volume:
6363

6464
### Interoperability considerations
6565

66-
You can't use cache volumes if the following features are configured on the source or destination:
66+
You can't use cache volumes if the following features are configured on the origin or cache:
67+
68+
>[!NOTE]
69+
> File Access Logs (FAL) for cache volumes isn't currently supported. Although diagnostic settings might be available for cache volumes, enabling diagnostic settings on a cache volume to configure File Access Logs has no effect.
6770
6871
#### Unsupported features
6972

articles/energy-data-services/release-notes.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,18 @@ This page is updated with the details about the upcoming release approximately a
2323

2424
<hr width = 100%>
2525

26+
## February 2026
27+
### OSDU&reg; Reservoir DMS - Generally Available
28+
OSDU&reg; Reservoir DMS is now generally available on Azure Data Manager for Energy.
29+
Reservoir DMS provides:
30+
- Standardized storage and management of reservoir engineering data—including models, grids, and simulation outputs—using OSDU-compliant schemas.
31+
- Consistent data quality, versioning, and traceability across workflows.
32+
- Seamless integration with simulation and analytics tools to support faster, more reliable reservoir decisions.
33+
Reservoir DMS is enabled on all partitions of existing and new Azure Data Manager for Energy instances. The feature is available in all regions where Azure Data Manager for Energy is offered, except Indonesia Central.
34+
35+
### Well Delivery DMS - Deprecation Notice
36+
OSDU Well Delivery DMS will be deprecated on Azure Data Manager for Energy with the release in the month of March. This follows the decision to deprecate the DMS in OSDU with the M26 milestone release.
37+
2638
## January 2026
2739
### External Data Service - Managed identity workflows
2840
Azure Data Manager for Energy now supports using managed identities for authentication in External Data Services (EDS) workflows. This enhancement allows you to securely connect to OSDU&reg; compliant external data sources without the need for hardcoding credentials, improving security and simplifying management of authentication in your data integration processes. You can use either system-assigned or user-assigned managed identities to authenticate EDS workflows with supported external data sources. For more information, see [How to enable External Data Services (EDS) Preview?](how-to-enable-external-data-services.md)

articles/iot-edge/deploy-confidential-applications.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ For more information, see [Getting started with Open Enclave for the Scalys Trus
5050

5151
## Develop and deploy
5252

53-
When you're ready to develop and deploy your confidential application, the [Microsoft Open Enclave](https://marketplace.visualstudio.com/items?itemName=ms-iot.msiot-vscode-openenclave) extension for Visual Studio Code can help. You can use either Linux or Windows as your development machine to develop modules for the TrustBox.
53+
When you're ready to develop and deploy your confidential application, the [Open Enclave SDK](https://github.com/openenclave/openenclave) can help. You can use either Linux or Windows as your development machine to develop modules for the TrustBox.
5454

5555
## Next steps
5656

articles/iot-edge/how-to-configure-proxy-support.md

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -231,34 +231,6 @@ This step takes place once on the IoT Edge device during initial device setup.
231231
https_proxy = "<proxy URL>"
232232
```
233233

234-
3. Add the **https_proxy** parameter to the environment variables section, and set your proxy URL as its value.
235-
236-
```toml
237-
[agent]
238-
name = "edgeAgent"
239-
type = "docker"
240-
241-
[agent.config]
242-
image = "mcr.microsoft.com/azureiotedge-agent:1.5"
243-
244-
[agent.env]
245-
# RuntimeLogLevel = "debug"
246-
# UpstreamProtocol = "AmqpWs"
247-
https_proxy = "<proxy URL>"
248-
```
249-
250-
4. The IoT Edge runtime uses AMQP by default to talk to IoT Hub. Some proxy servers block AMQP ports. If that's the case, then you also need to configure edgeAgent to use AMQP over WebSocket. Uncomment the `UpstreamProtocol` parameter.
251-
252-
```toml
253-
[agent.config]
254-
image = "mcr.microsoft.com/azureiotedge-agent:1.5"
255-
256-
[agent.env]
257-
# RuntimeLogLevel = "debug"
258-
UpstreamProtocol = "AmqpWs"
259-
https_proxy = "<proxy URL>"
260-
```
261-
262234
5. Save the changes and close the editor. Apply the changes.
263235

264236
```bash
@@ -328,7 +300,7 @@ With the environment variables included, the module definition looks like the fo
328300
}
329301
```
330302

331-
If you included the **UpstreamProtocol** environment variable in the config.yaml file on your IoT Edge device, add that to the IoT Edge agent module definition too.
303+
If you included the **UpstreamProtocol** environment variable in the config.toml file on your IoT Edge device, add that to the IoT Edge agent module definition too.
332304

333305
```json
334306
"env": {

articles/iot-edge/how-to-create-transparent-gateway.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,6 @@ If you don't have your own certificate authority and want to use demo certificat
8888

8989
1. Check the certificate meets [format requirements](how-to-manage-device-certificates.md#format-requirements).
9090
1. If you created the certificates on a different machine, copy them to your IoT Edge device. Use a USB drive, a service like [Azure Key Vault](/azure/key-vault/general/overview), or a command like [Secure file copy](https://www.ssh.com/ssh/scp/).
91-
1. Move the files to the preferred directory for certificates and keys: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
9291
1. Create the certificates and keys directories and set permissions. Store your certificates and keys in the preferred `/var/aziot` directory: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
9392

9493
```bash
@@ -101,6 +100,7 @@ If you don't have your own certificate authority and want to use demo certificat
101100
sudo chown aziotks:aziotks /var/aziot/secrets
102101
sudo chmod 700 /var/aziot/secrets
103102
```
103+
1. Move the files to the preferred directory for certificates and keys: `/var/aziot/certs` for certificates and `/var/aziot/secrets` for keys.
104104
1. Change the ownership and permissions for the certificates and keys.
105105

106106
```bash
@@ -112,7 +112,7 @@ If you don't have your own certificate authority and want to use demo certificat
112112
# Give aziotks ownership to private keys
113113
# Read and write for aziotks, no permission for others
114114
sudo chown -R aziotks:aziotks /var/aziot/secrets
115-
sudo find /var/aziot/secrets -type f -name "*.*" -exec chmod 600 {} \;
115+
sudo find /var/aziot/secrets -type f -name "*.*" -exec chmod 600 {} \;
116116
```
117117

118118
# [IoT Edge for Linux on Windows](#tab/eflow)

articles/iot-operations/develop-edge-apps/howto-build-akri-connectors-vscode.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,9 @@ Next, build the project to confirm there are no errors. Use the VS Code command
8585

8686
In this example, you create an HTTP/REST connector using the Rust language, build a Docker image, and then run the connector application by using the VS Code extension:
8787

88+
> [!IMPORTANT]
89+
> The following example code is meant for illustrative purposes only and is not intended to be used in production. In a production connector, you should implement robust error handling and retry logic, and ensure that any credentials used to connect to the asset are stored and used securely. A production quality connector must implement the contract described in the [Akri operator and connector contract](https://github.com/Azure/iot-operations-sdks/blob/main/doc/akri_connector/Akri%20operator%20and%20connector%20contract.md) document in the SDKs repository.
90+
8891
1. Press `Ctrl+Shift+P` to open the command palette and search for the **Azure IoT Operations Akri Connectors: Create a New Akri Connector** command. Create a new folder called `my-connectors` and select it, select **Rust** as the language, and enter a name for the connector like `rest_connector`.
8992

9093
1. The extension creates a new workspace named by using the connector name you chose in the previous step. The workspace includes the scaffolding for a connector written in the Rust language. There are `Implement` tags in the comments to help you write your own custom Akri connector. For testing purposes, you can try out the connector with just the scaffolding code. To see logs from your connector crate, replace the tag `sample_connector_scaffolding` with your connector name in the `DEFAULT_LOG_LEVEL` variable in the `main.rs` file.

articles/iot-operations/develop-edge-apps/overview-akri-connectors.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ For more information about Akri services and how they relate to Azure IoT Operat
2121
Understanding these core concepts is essential for developing custom Akri connectors:
2222

2323
- **Akri connector**: A custom software component that acts as a protocol adapter, enabling Azure IoT Operations to discover, connect to, and communicate with physical devices. The connector translates between device-specific protocols and the standardized Azure IoT Operations data model.
24+
- **Akri operator and connector contract**: A defined interface and set of requirements that connectors must implement to ensure compatibility with Akri services and Azure IoT Operations. This contract specifies how connectors should handle configuration, device discovery, data exchange, and communication with other platform components. TO learn more, see the [Akri operator and connector contract](https://github.com/Azure/iot-operations-sdks/blob/main/doc/akri_connector/Akri%20operator%20and%20connector%20contract.md)
2425
- **Connector metadata**: A JSON file that describes the connector's configuration options, capabilities, and UI schemas. The metadata defines how the connector appears and behaves when you:
2526
- Create connector template instances in the Azure portal.
2627
- Configure devices and assets in the operations experience UI.
@@ -43,6 +44,7 @@ The development and deployment of Akri connectors follows a structured workflow
4344
- **Build the connector**: Use the Azure IoT Operations SDK, templates, or VS Code extension to develop connector logic that implements:
4445
- Connectivity to a physical device.
4546
- Authentication to a physical device.
47+
- Configuration management based on the connector contract.
4648
- Data exchange with the physical device.
4749
- Optionally, device and asset discovery.
4850
- Delivery of the data to a destination in the cluster.
@@ -97,3 +99,4 @@ Akri connectors integrate seamlessly with the broader Azure IoT Operations envir
9799
- [What are Akri services?](../discover-manage-assets/overview-akri.md)
98100
- [Build and deploy Akri connectors](howto-develop-akri-connectors.md)
99101
- [Build Akri connectors with the VS Code extension](howto-build-akri-connectors-vscode.md)
102+
- [Akri operator and connector contract](https://github.com/Azure/iot-operations-sdks/blob/main/doc/akri_connector/Akri%20operator%20and%20connector%20contract.md)

articles/iot-operations/troubleshoot/known-issues.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,22 @@ If you create a `RegistryEndpoint` resource using bicep and reference it in the
9393

9494
Workaround: Don't use `RegistryEndpoint` resources with Akri connectors. Instead, specify the registry information in the `ContainerRegistry` settings in the `ConnectorTemplate` resource.
9595

96+
### Akri error when updating or deleting an Azure IoT Operations instance
97+
98+
---
99+
100+
Issue ID: 9347
101+
102+
---
103+
104+
Fixed in version 1.2.154 (2512) and later
105+
106+
---
107+
108+
Users may encounter an error regarding expired webhook certificates with Akri when deleting/upgrading instances of Azure IoT Operations or performing CRUD operations on Akri resources such as *Connector* and *ConnectorTemplates* instances.
109+
110+
Workaround: run `kubectl delete pod -n azure-iot-operations aio-akri-webhook-0 --ignore-not-found` to delete and restart the webhook pods to enable the pod to pick up the new certificate.
111+
96112
## Connector for OPC UA issues
97113

98114
This section lists current known issues for the connector for OPC UA.

articles/migrate/discovered-metadata.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -298,8 +298,12 @@ Published date | `apt-get -s dist-upgrade, yum -q check-update, zypper list-upda
298298

299299
> [!NOTE]
300300
> If your Red Hat Enterprise Linux (RHEL) servers use `yum` and aren't patched regularly, pending updates data can consume storage in the cache under `var\tmp\yum\-<username>`. To manage disk space, it is recommended to clear the cache regularly.
301-
>
302-
> To disable discovery of pending updates, visit 'HKLM:\SOFTWARE\Microsoft\AzureAppliance' and set the registry of type 'REG_DWORD EnablePendingUpdatesDiscovery' to 0. You must restart the appliance after setting the registry to ensure changes are reflected. To re-enable discovery of pending updates, set the registry 'EnablePendingUpdatesDiscovery' to 1.
301+
> [!NOTE]
302+
> To disable discovery of pending updates:
303+
> 1. Go to `HKLM:\SOFTWARE\Microsoft\AzureAppliance`.
304+
> 1. Set the `EnablePendingUpdatesDiscovery` registry value (type `REG_DWORD`) to `0`.
305+
> 1. Restart the appliance for the change to take effect. </be></br>
306+
> To re-enable discovery of pending updates, set the `EnablePendingUpdatesDiscovery` registry value to `1` and restart the appliance.
303307
304308
## SQL Server instance and database data
305309

articles/sentinel/aws-disruption.md

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,11 @@ ms.topic: how-to
1010

1111
# Enable attack disruption actions on AWS with Microsoft Sentinel (preview)
1212

13-
This article describes how to configure your AWS environment so that Microsoft Sentinel can take automated actions on a user that assumes a SAML role, or on an AWS IAM account when an alert is triggered. Attack disruption uses high-confidence signals to contain compromised assets and limit the impact of attacks, including actions on identities in AWS.
13+
This article describes how to configure your AWS environment so that Microsoft Sentinel can take automated actions on a user that assumes a SAML role, or on an AWS IAM account when an alert is triggered. Attack disruption uses high-confidence signals to contain compromised assets and limit the damage from attacks, including actions on identities in AWS.
1414

1515
## Prerequisites
1616

17-
Before you begin, ensure the following:
17+
Before you begin, you need the following prerequisites in place:
1818

1919
- You have an active AWS account with administrative privileges.
2020
- Your Microsoft Sentinel analytic workspace is connected to the unified security operations portal.
@@ -27,13 +27,11 @@ Before you begin, ensure the following:
2727

2828
### 1.1 Create a dedicated IAM role for Microsoft Sentinel
2929

30-
1. In the AWS console, go to **IAM \> Roles**.
30+
1. [Create a new IAM role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create.html) in the AWS Management Console.
3131

32-
1. Select **Create role**.
32+
- Select **AWS service** as the trusted entity and choose **EC2** (you'll update the trust relationship [next](#12-configure-trust-relationship)).
3333

34-
1. Select **AWS service** as the trusted entity and choose **EC2** (you'll update the trust relationship later).
35-
36-
1. Attach the following policy to the role (replace \<YOUR_ACCOUNT_ID\> as needed):
34+
- Attach the following policy to the role (replace \<YOUR_ACCOUNT_ID\> as needed):
3735

3836
```json
3937
{
@@ -50,7 +48,6 @@ Before you begin, ensure the following:
5048
"iam:RemoveUserFromGroup",
5149
"iam:ResetServiceSpecificCredential",
5250
"iam:ResyncMFADevice",
53-
"iam:RevokeSession",
5451
"iam:DeleteUserPermissionsBoundary",
5552
"iam:DeleteUserPolicy",
5653
"iam:DetachUserPolicy"
@@ -61,15 +58,11 @@ Before you begin, ensure the following:
6158
}
6259
```
6360

64-
1. Name the role (for example, SentinelAttackDisruptionRole) and create it.
65-
6661
### 1.2 Configure trust relationship
6762

68-
1. In the IAM role you created, go to the **Trust relationships** tab.
69-
70-
1. Select **Edit trust relationship**.
63+
Create a [custom trust policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html#roles-creatingrole-custom-trust-policy-console) for the IAM role.
7164

72-
1. Replace the trust policy with the following, specifying the Microsoft Sentinel integration principal (replace `<YOUR_AZURE_SUBSCRIPTION_ID>` with your actual Azure subscription ID):
65+
Use the following trust policy, specifying the Microsoft Sentinel integration principal (replace `<YOUR_AZURE_SUBSCRIPTION_ID>` with your actual Azure subscription ID):
7366

7467
```json
7568
{

0 commit comments

Comments
 (0)