Skip to content

Commit 59f0a2e

Browse files
Merge pull request #312925 from MicrosoftDocs/main
Auto Publish – main to live - 2026-03-10 16:00 UTC
2 parents 4fcf3d8 + bbd030a commit 59f0a2e

87 files changed

Lines changed: 590 additions & 276 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

articles/artifact-signing/how-to-sign-ci-policy.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,56 +20,56 @@ To complete the steps in this article, you need:
2020
- An Artifact Signing account, identity validation, and certificate profile.
2121
- Individual or group assignment of the Artifact Signing Certificate Profile Signer role.
2222
- [Azure PowerShell in Windows](/powershell/azure/install-azps-windows) installed.
23-
- [Az.TrustedSigning](/powershell/module/az.trustedsigning/) module downloaded.
23+
- [Az.ArtifactSigning](/powershell/module/az.artifactsigning/) module downloaded.
2424

2525
## Sign a CI policy
2626

2727
1. ⁠Open [PowerShell 7](https://github.com/PowerShell/PowerShell/releases/latest).
2828

29-
1. Optionally, you can create a *metadata.json* file that looks like this example:(`"Endpoint"` URI value must be a URI that aligns with the region where you created your Artifact Signing account and certificate profile when you set up these resources.)
29+
1. Optionally, you can create a *metadata.json* file that looks like this example: (`"Endpoint"` URI value must be a URI that matches the region where you created your Artifact Signing account and certificate profile when you set up these resources.)
3030

3131
```json
3232
{
3333
"Endpoint":"https://xxx.codesigning.azure.net/",
34-
"CodeSigningAccountName":"<Artifact Signing Account Name>",
34+
"CodeSigningAccountName":"<Signing Account Name>",
3535
"CertificateProfileName":"<Certificate Profile Name>"
3636
}
3737
```
3838

39-
1. Get the [root certificate](/powershell/module/az.trustedsigning/get-aztrustedsigningcertificateroot) that you want to add to the trust store:
39+
1. Get the [root certificate](/powershell/module/az.artifactsigning/get-azartifactsigningcertificateroot?view=azps-15.4.0&preserve-view=true) that you want to add to the trust store:
4040

4141
```powershell
42-
Get-AzTrustedSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
42+
Get-AzArtifactSigningCertificateRoot -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/ -Destination c:\temp\root.cer
4343
```
4444

4545
If you're using a *metadata.json* file, run this command instead:
4646

4747
```powershell
48-
Get-AzTrustedSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
48+
Get-AzArtifactSigningCertificateRoot -MetadataFilePath C:\temp\metadata.json -Destination c:\temp\root.cer
4949
```
5050

51-
1. To get the [Extended Key Usage (EKU)](/powershell/module/az.trustedsigning/get-aztrustedsigningcustomereku) to insert into your policy:
51+
1. To get the [Extended Key Usage (EKU)](/powershell/module/az.artifactsigning/get-azartifactsigningcustomereku?view=azps-15.4.0&preserve-view=true) to insert into your policy:
5252

5353
```powershell
54-
Get-AzTrustedSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
54+
Get-AzArtifactSigningCustomerEku -AccountName TestAccount -ProfileName TestCertProfile -EndpointUrl https://xxx.codesigning.azure.net/
5555
```
5656

5757
If you're using a *metadata.json* file, run this command instead:
5858

5959
```powershell
60-
Get-AzTrustedSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
60+
Get-AzArtifactSigningCustomerEku -MetadataFilePath C:\temp\metadata.json
6161
```
6262

63-
1. To [sign your policy](/powershell/module/az.trustedsigning/invoke-aztrustedsigningcipolicysigning), run the `invoke` command:
63+
1. To [sign your policy](/powershell/module/az.artifactsigning/invoke-azartifactsigningcipolicysigning?view=azps-15.4.0&preserve-view=true), run the `invoke` command:
6464

6565
```powershell
66-
Invoke-AzTrustedSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
66+
Invoke-AzArtifactSigningCIPolicySigning -accountName TestAccount -profileName TestCertProfile -endpointurl "https://xxx.codesigning.azure.net/" -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
6767
```
6868

6969
If you're using a *metadata.json* file, run this command instead:
7070

7171
```powershell
72-
Invoke-AzTrustedSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
72+
Invoke-AzArtifactSigningCIPolicySigning -MetadataFilePath C:\temp\metadata.json -Path C:\Temp\defaultpolicy.bin -Destination C:\Temp\defaultpolicy_signed.bin -TimeStamperUrl: http://timestamp.acs.microsoft.com
7373
```
7474

7575
## Create and deploy a CI policy

articles/automation/whats-new.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Significant updates to Azure Automation updated each month.
44
services: automation
55
ms.subservice:
66
ms.topic: overview
7-
ms.date: 08/12/2025
7+
ms.date: 03/10/2026
88
ms.custom: references_regions
99
ms.author: v-rochak2
1010
author: RochakSingh-blr
@@ -23,6 +23,16 @@ Azure Automation receives improvements on an ongoing basis. To stay up to date w
2323

2424
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Automation](whats-new-archive.md).
2525

26+
## March 2026
27+
28+
### Security Update: Azure Automation Windows Hybrid Worker Extension (1.3.74)
29+
30+
Windows Hybrid Worker Extension Version 1.3.74 includes a security improvement that strengthens access controls for communication with Hybrid Instance Metadata Service (HIMDS).
31+
32+
Under specific startup timing conditions, the Windows Hybrid Worker Extension tries to connect to HIMDS before the service is fully initialized. In this narrow window, a local nonprivileged process can impersonate the metadata service endpoint and gain unauthorized read access to protected metadata or configuration information.
33+
34+
This release addresses the issue by adding an extra validation to ensure that it connects only to trusted, system owned metadata endpoints. These changes enhance protection of system metadata and configuration information by ensuring access is limited to trusted system components.
35+
2636
## August 2025
2737

2838
### Deployment resumption: Azure Automation revised Service and Subscription limits
-4.76 KB
Loading

articles/azure-vmware/use-hcx-run-commands.md

Lines changed: 57 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Use VMware HCX Run Commands
33
description: Use VMware HCX Run Commands in Azure VMware Solution
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.custom: engagement-fy23
7-
ms.date: 3/22/2024
6+
ms.custom: engagement-fy26
7+
ms.date: 3/5/2026
88
# Customer intent: As a cloud administrator, I want to execute VMware HCX Run Commands in an Azure VMware Solution, so that I can manage and scale the HCX Manager efficiently while maintaining service integrity during operations.
99
---
1010

@@ -35,31 +35,73 @@ Optional run command parameters.
3535
1. Wait for command to finish. It can take few minutes for the VMware HCX appliance to come online.
3636

3737
## Scale VMware HCX manager
38-
Use the Scale VMware HCX Cloud Manager Run Command to increase the resource allocation of your VMware HCX Cloud Manager virtual machine to 8 vCPUs and 24-GB RAM from the default setting of 4 vCPUs and 12-GB RAM, ensuring scalability.
38+
Use the Scale VMware HCX Cloud Manager Run Command to increase the resource allocation of your VMware HCX Cloud Manager virtual machine, ensuring scalability for larger deployments and increased concurrent migrations.
39+
40+
**Supported in HCX 4.10+**
3941

4042
**Scenario**: Mobility Optimize Networking (MON) requires VMware HCX Scalability. For more details on [MON scaling](https://kb.vmware.com/s/article/88401)
4143

4244
>[!NOTE]
4345
> VMware HCX Cloud Manager will be rebooted during this operation, and this may affect any ongoing migration processes.
4446
45-
1. Navigate to the Run Command panel on in an Azure VMware Solution private cloud on the Azure portal.
47+
1. Navigate to the **Run Command** panel under **Operations** in an Azure VMware Solution private cloud on the Azure portal.
4648

47-
1. Select the **Microsoft.AVS.HCX** package dropdown menu and select the **Set-HcxScaledCpuAndMemorySetting** command.
49+
2. Select the **Microsoft.AVS.HCX** package dropdown menu and select the **Set-HcxScaledCpuAndMemorySetting** command.
4850

4951
:::image type="content" source="media/hcx-commands/set-hcx-scale.png" alt-text="Diagram that shows run command parameters for Set-HcxScaledCpuAndMemorySetting command." border="false" lightbox="media/hcx-commands/set-hcx-scale.png":::
5052

51-
1. Agree to restart VMware HCX by toggling ``AgreeToRestartHCX`` to **True**.
52-
You need to acknowledge that the virtual machine will be restarted.
53-
54-
55-
>[!NOTE]
56-
> If this required parameter is set to false that cmdlet execution will fail.
53+
3. Set parameters and select Run. Optional run command parameters.
5754

58-
1. Select **Run** to execute.
59-
This process takes between 10-15 minutes.
55+
If the parameters are used incorrectly, they can halt active migrations and replications and cause other issues. Brief description of each parameter with an example of when it should be used:
56+
57+
**ScaleFormFactor Parameter** - Specifies the target form factor for the HCX Manager VM — *"Medium"* or *"Large"*. Defaults to *"Medium"* if not specified. See [Form Factor Specification](use-hcx-run-commands.md) for details on each size.
58+
59+
**DiskStorageFormat Parameter** - Specifies the storage format for the new disk added during scaling — *"Thin"*, *"Thick"*, or *"EagerZeroedThick"*. Defaults to *"Thin"*. See [Disk Storage Formats] for guidance on choosing a format.
60+
61+
**AgreeToRestartHCX Parameter** (required) - Acknowledgment that the HCX Manager VM will be restarted during the scaling operation. Must be set to *True* for the command to execute. If set to *False*, the cmdlet execution will fail.
62+
63+
**Force Parameter** - Bypasses safety checks such as active migration and replication detection and existing snapshot validation. Use this parameter when a migration is stuck in an active state and you still need to proceed with scaling.
64+
65+
**SkipSnapshot Parameter** - Skips the creation of a pre-scaling snapshot. Requires the *-Force* parameter to be set. Not recommended, as the automatic snapshot provides a safety net for failure recovery.
66+
67+
4. Select **Run** to execute. This process takes between 10-15 minutes.
6068

61-
>[!NOTE]
62-
> VMware HCX cloud manager will be unavailable during the scaling.
69+
>[!NOTE]
70+
> VMware HCX Cloud Manager will be unavailable during the scaling.
71+
72+
### Form Factor Specifications
73+
74+
| Form Factor | vCPU | Memory | Disk | Use Case |
75+
| :--- | :--- | :--- | :--- | :--- |
76+
| **Small** (current default) | 4 | 12 GB | 60 GB | Small deployments, <500 VMs |
77+
| **Medium** | 8 | 24 GB | 120 GB | Medium deployments, 500-2000 VMs |
78+
| **Large** | 32 | 48 GB | 300 GB | Large deployments, >2000 VMs |
79+
>[!NOTE]
80+
>"Small" is the default form factor already deployed. It is not a selectable option in the *Set-HcxScaledCpuAndMemorySetting* command. The command only scales up to **Medium** or **Large**.
81+
82+
### Disk Storage Formats
83+
84+
| Format | Description | Performance | Space Efficiency | Use Case |
85+
| :--- | :--- | :--- | :--- | :--- |
86+
| **Thin** | Lazy-zeroed thin provisioning | Good | High | Default, most environments |
87+
| **Thick** | Eager-zeroed thick provisioning | Better | Low | Performance-critical |
88+
| **EagerZeroedThick** | Zeroed at creation | Best | Lowest | Maximum performance |
89+
90+
>[!NOTE]
91+
>Use the default "Thin" unless specific performance requirements dictate otherwise. Thin disks grow on-demand, while Thick and EagerZeroedThick allocate full space immediately.
92+
93+
### Automatic Failure Recovery
94+
If scaling fails at any point during execution, the system automatically recovers:
95+
96+
1. **Snapshot revert** - Automatically reverts to the pre-scaling snapshot.
97+
98+
2. **Power on** - Powers on HCX Manager from the snapshot state (last known good configuration).
99+
100+
3. **Error reporting** - Returns detailed error information.
101+
102+
4. **No manual intervention required** - The systems automatically recovers to a working state.
103+
104+
**Recovery time**: Typically 5-10 minutes to revert and power on.
63105

64106
## Take a snapshot of VMware HCX Cloud Manager
65107

0 commit comments

Comments
 (0)