Skip to content

Commit 296acfa

Browse files
author
Mutemwa Masheke
committed
Address Acrolinx feedback for 04-operations-troubleshooting.md
Clarity improvements: - Simplified complex sentence about guest assignment resources by breaking it into clearer parts - Improved active voice usage and sentence structure - Replaced 'This is especially true' with more specific language Spelling and grammar fixes: - Fixed spelling error: 'Confgiguration' → 'Configuration' - Improved present tense usage instead of present perfect Tone improvements: - Added contractions to make content less formal: 'do not' → 'don't', 'is not' → 'isn't' - Removed unnecessary filler words: 'Please check' → 'Check' Terminology improvements: - Added acronym definitions: STIG (Security Technical Implementation Guide), OMI (Open Management Infrastructure), DSC (Desired State Configuration), VM (Virtual Machine) - First occurrence of each acronym now includes full definition Document structure improvements: - Improved readability and flow - Maintained technical accuracy while enhancing clarity
1 parent 2fd1c63 commit 296acfa

1 file changed

Lines changed: 15 additions & 15 deletions

File tree

articles/governance/machine-configuration/overview/04-operations-troubleshooting.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ ms.custom: references_regions
1212

1313
Customers designing a highly available solution should consider the redundancy planning
1414
requirements for [virtual machines][28] because guest assignments are extensions of machine
15-
resources in Azure. When guest assignment resources are provisioned into an Azure region that's
16-
[paired][29], you can view guest assignment reports if at least one region in the pair is
15+
resources in Azure. Guest assignment resources can be provisioned into Azure regions that are
16+
[paired][29]. You can view guest assignment reports if at least one region in the pair is
1717
available. When the Azure region isn't paired and it becomes unavailable, you can't access reports
1818
for a guest assignment. When the region is restored, you can access the reports again.
1919

2020
It's best practice to assign the same policy definitions with the same parameters to all machines
21-
in the solution for highly available applications. This is especially true for scenarios where
21+
in the solution for highly available applications. These considerations are especially important for scenarios where
2222
virtual machines are provisioned in [Availability Sets][30] behind a load balancer solution. A
2323
single policy assignment spanning all machines has the least administrative overhead.
2424

@@ -55,16 +55,16 @@ assignments:
5555
| /providers/Microsoft.Authorization/policyDefinitions/63594bb8-43bb-4bf0-bbf8-c67e5c28cb65 | [Preview]: Linux machines should meet STIG compliance requirement for Azure compute |
5656
| /providers/Microsoft.Authorization/policyDefinitions/50c52fc9-cb21-4d99-9031-d6a0c613361c | [Preview]: Windows machines should meet STIG compliance requirements for Azure compute |
5757
| /providers/Microsoft.Authorization/policyDefinitions/e79ffbda-ff85-465d-ab8e-7e58a557660f | [Preview]: Linux machines with OMI installed should have version 1.6.8-1 or later |
58-
| /providers/Microsoft.Authorization/policyDefinitions/934345e1-4dfb-4c70-90d7-41990dc9608b | Audit Windows machines that do not contain the specified certificates in Trusted Root |
59-
| /providers/Microsoft.Authorization/policyDefinitions/08a2f2d2-94b2-4a7b-aa3b-bb3f523ee6fd | Audit Windows machines on which the DSC configuration is not compliant |
60-
| /providers/Microsoft.Authorization/policyDefinitions/c648fbbb-591c-4acd-b465-ce9b176ca173 | Audit Windows machines that do not have the specified Windows PowerShell execution policy |
61-
| /providers/Microsoft.Authorization/policyDefinitions/3e4e2bd5-15a2-4628-b3e1-58977e9793f3 | Audit Windows machines that do not have the specified Windows PowerShell modules installed |
62-
| /providers/Microsoft.Authorization/policyDefinitions/58c460e9-7573-4bb2-9676-339c2f2486bb | Audit Windows machines on which Windows Serial Console is not enabled |
63-
| /providers/Microsoft.Authorization/policyDefinitions/e6ebf138-3d71-4935-a13b-9c7fdddd94df | Audit Windows machines on which the specified services are not installed and 'Running' |
64-
| /providers/Microsoft.Authorization/policyDefinitions/c633f6a2-7f8b-4d9e-9456-02f0f04f5505 | Audit Windows machines that are not set to the specified time zone |
58+
| /providers/Microsoft.Authorization/policyDefinitions/934345e1-4dfb-4c70-90d7-41990dc9608b | Audit Windows machines that don't contain the specified certificates in Trusted Root |
59+
| /providers/Microsoft.Authorization/policyDefinitions/08a2f2d2-94b2-4a7b-aa3b-bb3f523ee6fd | Audit Windows machines on which the DSC configuration isn't compliant |
60+
| /providers/Microsoft.Authorization/policyDefinitions/c648fbbb-591c-4acd-b465-ce9b176ca173 | Audit Windows machines that don't have the specified Windows PowerShell execution policy |
61+
| /providers/Microsoft.Authorization/policyDefinitions/3e4e2bd5-15a2-4628-b3e1-58977e9793f3 | Audit Windows machines that don't have the specified Windows PowerShell modules installed |
62+
| /providers/Microsoft.Authorization/policyDefinitions/58c460e9-7573-4bb2-9676-339c2f2486bb | Audit Windows machines on which Windows Serial Console isn't enabled |
63+
| /providers/Microsoft.Authorization/policyDefinitions/e6ebf138-3d71-4935-a13b-9c7fdddd94df | Audit Windows machines on which the specified services aren't installed and 'Running' |
64+
| /providers/Microsoft.Authorization/policyDefinitions/c633f6a2-7f8b-4d9e-9456-02f0f04f5505 | Audit Windows machines that aren't set to the specified time zone |
6565

6666
> [!NOTE]
67-
> Please check this page periodically for updates to the list of built-in machine configuration
67+
> Check this page periodically for updates to the list of built-in machine configuration
6868
> policy definitions that support multiple assignments.
6969
7070
### Assignments to Azure management groups
@@ -73,15 +73,15 @@ Azure Policy definitions in the category `Guest Configuration` can be assigned t
7373
when the effect is `AuditIfNotExists` or `DeployIfNotExists`.
7474

7575
> [!IMPORTANT]
76-
> When [policy exemptions][47] are created on a Machine Confgiguration policy, the associated guest assignment will need to be deleted in order to stop the agent from scanning.
76+
> When [policy exemptions][47] are created on a Machine Configuration policy, the associated guest assignment needs to be deleted to stop the agent from scanning.
7777
7878
### Client log files
7979

8080
The machine configuration extension writes log files to the following locations:
8181

8282
Windows
8383

84-
- Azure VM: `C:\ProgramData\GuestConfig\gc_agent_logs\gc_agent.log`
84+
- Azure Virtual Machine: `C:\ProgramData\GuestConfig\gc_agent_logs\gc_agent.log`
8585
- Arc-enabled server: `C:\ProgramData\GuestConfig\arc_policy_logs\gc_agent.log`
8686

8787
Linux
@@ -133,7 +133,7 @@ egrep -B $LINES_TO_INCLUDE_BEFORE_MATCH -A $LINES_TO_INCLUDE_AFTER_MATCH 'DSCEng
133133
### Agent files
134134

135135
The machine configuration agent downloads content packages to a machine and extracts the contents.
136-
To verify what content has been downloaded and stored, view the folder locations in the following
136+
To verify downloaded and stored content, view the folder locations in the following
137137
list.
138138

139139
- Windows: `C:\ProgramData\guestconfig\configuration`
@@ -142,7 +142,7 @@ list.
142142

143143
### Open-source nxtools module functionality
144144

145-
A new open-source [nxtools module][37] has been released to help make managing Linux systems easier
145+
A new open-source [nxtools module][37] is now available to help make managing Linux systems easier
146146
for PowerShell users.
147147

148148
The module helps in managing common tasks such as:

0 commit comments

Comments
 (0)