You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/cli-samples.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: maud-lv
5
5
ms.author: malev
6
6
ms.service: azure-app-configuration
7
7
ms.topic: sample
8
-
ms.date: 08/09/2022
8
+
ms.date: 1/9/2024
9
9
ms.custom: devx-track-azurecli, devdivchpfy22
10
10
---
11
11
12
12
# Azure CLI samples
13
13
14
-
The following table includes links to bash scripts for Azure App Configuration by using the [az appconfig](/cli/azure/appconfig) commands in the Azure CLI:
14
+
The following table includes links to Azure CLI scripts for Azure App Configuration using the [az appconfig](/cli/azure/appconfig) commands in the Azure CLI:
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-log-alert-query-samples.md
+20-9Lines changed: 20 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,13 +10,24 @@ ms.reviewer: nolavime
10
10
11
11
# Sample log alert queries that include ADX and ARG
12
12
13
-
A log alert rule monitors a resource by using a Log Analytics query to evaluate resource logs at a set frequency. You can include data from Azure Data Explorer and Azure Resource Graph in your log alert rule queries.
13
+
A log alert rule monitors a resource by using a Log Analytics query to evaluate logs at a set frequency. You can include data from Azure Data Explorer and Azure Resource Graph in your log alert rule queries.
14
14
15
15
This article provides examples of log alert rule queries that use Azure Data Explorer and Azure Resource Graph. For more information about creating a log alert rule, see [Create a log alert rule](./alerts-create-log-alert-rule.md).
16
16
17
-
## Query that checks virtual machine health
17
+
## Queries that check virtual machine health
18
18
19
-
This query finds virtual machines that are marked as critical and that had a heartbeat more than 24 hours ago, but that haven't had a heartbeat in the last 2 minutes.
19
+
This query finds virtual machines marked as critical that haven't had a heartbeat in the last 2 minutes.
20
+
21
+
```kusto
22
+
arg("").Resources
23
+
| where type == "microsoft.compute/virtualmachines"
24
+
| summarize LastCall = max(case(isnull(TimeGenerated), make_datetime(1970, 1, 1), TimeGenerated)) by name, id
This query finds virtual machines marked as critical that had a heartbeat more than 24 hours ago, but that haven't had a heartbeat in the last 2 minutes.
20
31
21
32
```kusto
22
33
{
@@ -38,15 +49,15 @@ This query finds virtual machines that are marked as critical and that had a hea
38
49
## Query that filters virtual machines that need to be monitored
39
50
40
51
```kusto
41
-
{
52
+
{
42
53
let RuleGroupTags = dynamic(['Linux']);
43
-
Perf | where ObjectName == 'Processor' and CounterName == '% Idle Time' and (InstanceName == '_Total' or InstanceName == 'total')
54
+
Perf | where ObjectName == 'Processor' and CounterName == '% Idle Time' and (InstanceName in ('_Total,'total'))
| where type =~ 'Microsoft.Compute/virtualMachines'
57
+
| where type =~ 'Microsoft.Compute/virtualMachines'
47
58
| project _ResourceId=tolower(id), tags) on _ResourceId
48
59
| project-away _ResourceId1
49
-
| where (isnull(tags.monitored) or tolower(tostring(tags.monitored)) != 'false') and (tostring(tags.monitorRuleGroup) in (RuleGroupTags) or isnull(tags.monitorRuleGroup) or tostring(tags.monitorRuleGroup) == '')
60
+
| where (tostring(tags.monitorRuleGroup) in (RuleGroupTags))
50
61
}
51
62
```
52
63
@@ -68,10 +79,10 @@ This query finds virtual machines that are marked as critical and that had a hea
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-containers-vulnerability-assessment-azure.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,24 @@
1
1
---
2
-
title: Vulnerability assessment for Azure powered by Qualys
2
+
title: Vulnerability assessment for Azure powered by Qualys (Deprecated)
3
3
description: Learn how to use Defender for Containers to scan images in your Azure Container Registry to find vulnerabilities.
4
4
author: dcurwin
5
5
ms.author: dacurwin
6
-
ms.date: 12/19/2023
6
+
ms.date: 12/25/2023
7
7
ms.topic: how-to
8
8
ms.custom: ignite-2022, build-2023
9
9
---
10
10
11
-
# Vulnerability assessment for Azure powered by Qualys
11
+
# Vulnerability assessment for Azure powered by Qualys (Deprecated)
12
+
13
+
> [!IMPORTANT]
14
+
>
15
+
> The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**. If you are currently using container vulnerability assessment powered by Qualys, start planning your transition to [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
16
+
>
17
+
> - For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
18
+
>
19
+
> - For more information about migrating to our new container vulnerability assessment offering powered by Microsoft Defender Vulnerability Management, see [Transition from Qualys to Microsoft Defender Vulnerability Management](transition-to-defender-vulnerability-management.md).
20
+
>
21
+
> - For common questions about the transition to Microsoft Defender Vulnerability Management, see [Common questions about the Microsoft Defender Vulnerability Management solution](common-questions-microsoft-defender-vulnerability-management.md).
12
22
13
23
Vulnerability assessment for Azure, powered by Qualys, is an out-of-box solution that empowers security teams to easily discover and remediate vulnerabilities in Linux container images, with zero configuration for onboarding, and without deployment of any agents.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/transition-to-defender-vulnerability-management.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,16 @@ ms.date: 01/08/2024
9
9
10
10
Microsoft Defender for Cloud is unifying all vulnerability assessment solutions to utilize the Microsoft Defender Vulnerability Management vulnerability scanner.
11
11
12
-
Microsoft Defender Vulnerability Management integrates across many cloud native use cases, such as containers ship and runtime scenarios.
12
+
Microsoft Defender Vulnerability Management integrates across many cloud native use cases, such as containers ship and runtime scenarios. As part of this change, we're retiring our built-in vulnerability assessments offering powered by Qualys.
13
+
14
+
> [!IMPORTANT]
15
+
> The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**.
16
+
>
17
+
> Customers that onboarded at least one subscription to Defender for Containers prior to **November 15th, 2023** can continue to use Container Vulnerability Assessment powered by Qualys until **March 1st, 2024**.
18
+
>
19
+
> For more information about the change, see [Defender for Cloud unifies Vulnerability Assessment solution powered by Microsoft Defender Vulnerability Management](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
20
+
21
+
If you're currently using the built vulnerability assessment solution powered by Qualys, start planning for the upcoming retirement by following the steps on this page.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/upcoming-changes.md
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,6 +26,7 @@ If you're looking for the latest release notes, you can find them in the [What's
26
26
| Planned change | Announcement date | Estimated date for change |
27
27
|--|--|--|
28
28
|[Defender for Servers built-in vulnerability assessment (Qualys) retirement path](#defender-for-servers-built-in-vulnerability-assessment-qualys-retirement-path)| January 9, 2024 | May 2024 |
29
+
|[Retirement of the Defender for Cloud Containers Vulnerability Assessment powered by Qualys](#retirement-of-the-defender-for-cloud-containers-vulnerability-assessment-powered-by-qualys)| January 9, 2023 | March 2024 |
29
30
|[New version of Defender Agent for Defender for Containers](#new-version-of-defender-agent-for-defender-for-containers)| January 4, 2024 | February 2024 |
30
31
|[Upcoming change for the Defender for Cloud’s multicloud network requirements](#upcoming-change-for-the-defender-for-clouds-multicloud-network-requirements)| January 3, 2024 | May 2024 |
31
32
|[Deprecation and severity changes to security alerts](#deprecation-and-severity-changes-to-security-alerts)| December 27, 2023 | January 2024 |
@@ -51,6 +52,20 @@ For more information about our decision to unify our vulnerability assessment of
51
52
52
53
You can also check out the [common questions about the transition to Microsoft Defender Vulnerability Management solution](faq-scanner-detection.yml).
53
54
55
+
## Retirement of the Defender for Cloud Containers Vulnerability Assessment powered by Qualys
56
+
57
+
**Announcement date: January 9, 2023**
58
+
59
+
**Estimated date for change: March 2024**
60
+
61
+
The Defender for Cloud Containers Vulnerability Assessment powered by Qualys is now on a retirement path completing on **March 1st, 2024**. If you are currently using container vulnerability assessment powered by Qualys, start planning your transition to [Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management](agentless-vulnerability-assessment-azure.md).
62
+
63
+
For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see [this blog post](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-cloud-unified-vulnerability-assessment-powered-by/ba-p/3990112).
64
+
65
+
For more information about transitioning to our new container vulnerability assessment offering powered by Microsoft Defender Vulnerability Management, see [Transition from Qualys to Microsoft Defender Vulnerability Management](transition-to-defender-vulnerability-management.md).
66
+
67
+
For common questions about the transition to Microsoft Defender Vulnerability Management, see [Common questions about the Microsoft Defender Vulnerability Management solution](common-questions-microsoft-defender-vulnerability-management.md).
68
+
54
69
## New version of Defender Agent for Defender for Containers
Copy file name to clipboardExpand all lines: articles/hdinsight/hadoop/hdinsight-use-mapreduce.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to run Apache MapReduce jobs on Apache Hadoop in HDInsigh
4
4
ms.service: hdinsight
5
5
ms.topic: how-to
6
6
ms.custom: hdinsightactive
7
-
ms.date: 12/21/2022
7
+
ms.date: 01/04/2024
8
8
---
9
9
10
10
# Use MapReduce in Apache Hadoop on HDInsight
@@ -13,7 +13,7 @@ Learn how to run MapReduce jobs on HDInsight clusters.
13
13
14
14
## Example data
15
15
16
-
HDInsight provides various example data sets, which are stored in the `/example/data` and `/HdiSamples` directory. These directories are in the default storage for your cluster. In this document, we use the `/example/data/gutenberg/davinci.txt` file. This file contains the notebooks of Leonardo da Vinci.
16
+
HDInsight provides various example data sets, which are stored in the `/example/data` and `/HdiSamples` directory. These directories are in the default storage for your cluster. In this document, we use the `/example/data/gutenberg/davinci.txt` file. This file contains the notebooks of `Leonardo da Vinci`.
17
17
18
18
## Example MapReduce
19
19
@@ -101,8 +101,8 @@ HDInsight can run HiveQL jobs by using various methods. Use the following table
101
101
102
102
|**Use this**... |**...to do this**| ...from this **client operating system**|
103
103
|:--- |:--- |:--- |:--- |
104
-
|[SSH](apache-hadoop-use-mapreduce-ssh.md)|Use the Hadoop command through **SSH**|Linux, Unix, Mac OS X, or Windows |
105
-
|[Curl](apache-hadoop-use-mapreduce-curl.md)|Submit the job remotely by using **REST**|Linux, Unix, Mac OS X, or Windows |
104
+
|[SSH](apache-hadoop-use-mapreduce-ssh.md)|Use the Hadoop command through **SSH**|Linux, Unix, `MacOS X`, or Windows |
105
+
|[Curl](apache-hadoop-use-mapreduce-curl.md)|Submit the job remotely by using **REST**|Linux, Unix, `MacOS X`, or Windows |
106
106
|[Windows PowerShell](apache-hadoop-use-mapreduce-powershell.md)|Submit the job remotely by using **Windows PowerShell**|Windows |
Copy file name to clipboardExpand all lines: articles/hdinsight/hdinsight-log-management.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Determine the types, sizes, and retention policies for HDInsight ac
4
4
ms.service: hdinsight
5
5
ms.topic: how-to
6
6
ms.custom: hdinsightactive
7
-
ms.date: 12/07/2022
7
+
ms.date: 01/04/2024
8
8
---
9
9
10
10
# Manage logs for an HDInsight cluster
@@ -59,7 +59,7 @@ It's important to understand the workload types running on your HDInsight cluste
59
59
60
60
* Consider how you can collect logs from the cluster, or from more than one cluster, and collate them for purposes such as auditing, monitoring, planning, and alerting. You might use a custom solution to access and download the log files regularly, and combine and analyze them to provide a dashboard display. You can also add other capabilities for alerting for security or failure detection. You can build these utilities using PowerShell, the HDInsight SDKs, or code that accesses the Azure classic deployment model.
61
61
62
-
* Consider whether a monitoring solution or service would be a useful benefit. The Microsoft System Center provides an [HDInsight management pack](https://systemcenter.wiki/?Get_ManagementPackBundle=Microsoft.HDInsight.mpb&FileMD5=10C7D975C6096FFAA22C84626D211259). You can also use third-party tools such as Apache Chukwa and Ganglia to collect and centralize logs. Many companies offer services to monitor Hadoop-based big data solutions, for example: Centerity, Compuware APM, Sematext SPM, and Zettaset Orchestrator.
62
+
* Consider whether a monitoring solution or service would be a useful benefit. The Microsoft System Center provides an [HDInsight management pack](https://systemcenter.wiki/?Get_ManagementPackBundle=Microsoft.HDInsight.mpb&FileMD5=10C7D975C6096FFAA22C84626D211259). You can also use third-party tools such as Apache Chukwa and Ganglia to collect and centralize logs. Many companies offer services to monitor Hadoop-based big data solutions, for example: `Centerity`, Compuware APM, Sematext SPM, and Zettaset Orchestrator.
63
63
64
64
## Step 2: Manage cluster service versions and view logs
65
65
@@ -119,7 +119,7 @@ YARN aggregates logs across all containers on a worker node and stores those log
119
119
/app-logs/<user>/logs/<applicationId>
120
120
```
121
121
122
-
The aggregated logs aren't directly readable, as they're written in a TFile binary format indexed by container. Use the YARN ResourceManager logs or CLI tools to view these logs as plain text for applications or containers of interest.
122
+
The aggregated logs aren't directly readable, as they're written in a `TFile` binary format indexed by container. Use the YARN `ResourceManager` logs or CLI tools to view these logs as plain text for applications or containers of interest.
0 commit comments