You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/boards/github/link-to-from-github.md
+9-2
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: chcomley
8
8
author: chcomley
9
9
ms.topic: quickstart
10
10
monikerRange: "<=azure-devops"
11
-
ms.date: 10/02/2024
11
+
ms.date: 04/23/2025
12
12
---
13
13
14
14
# Link GitHub commits, pull requests, branches, and issues to work items in Azure Boards
@@ -41,13 +41,20 @@ AB#{ID}
41
41
42
42
For example, `AB#125` links to work item ID 125.
43
43
44
-
You can also enter a commit or pull request message to transition the work item. The system recognizes `fix`, `fixes`, and `fixed`, and applies it to the #-mention item that follows. Mentioned work items transition to the first **State** associated with the *Resolved* workflow category state. If no **State** is associated with *Resolved*, the work item transitions to the **State** associated with the *Completed* workflow category state. For more information, see [How workflow category states are used in Azure Boards backlogs and boards](../work-items/workflow-and-state-categories.md).
44
+
You can also enter a commit or pull request message to transition the work item. The system recognizes `{state}` or `{state category}`, along with `fix`, `fixes`, `fixed`, and applies it to the #-mention item that follows.
45
+
46
+
When a pull request description includes a valid state name, for example, ``Closed AB#1234``, the system updates the referenced work item to that specific state. If the state name isn’t recognized directly, Azure Boards tries to match it to a workflow category like ``Resolved`` or ``Completed``. If a match is found, the work item transitions to the first available state defined under that category.
47
+
48
+
By default, work items referenced with ``fix``, ``fixes``, or ``fixed`` transitions to the first state associated with the **Resolved** category. If no such state exists in the current process, the system instead transitions the work item to the first state in the **Completed** category.
49
+
50
+
For more information, see [How workflow category states are used in Azure Boards backlogs and boards](../work-items/workflow-and-state-categories.md).
|`Fixed AB#123`| Links and transitions the work item to the *Resolved* workflow state category or, if none is defined, then the *Completed* workflow state category. |
57
+
| `Closed AB#123` | Links and transitions the work item to the *Closed* workflow state. If none is defined, no transitions are made.
51
58
|`Adds a new feature, fixes AB#123.`| Links and transitions the work item to the *Resolved* workflow state category or, if none is defined, then the *Completed* workflow state category. |
52
59
|`Fixes AB#123, AB#124, and AB#126`| Links to Azure Boards work items 123, 124, and 126. Transitions only the first item, 123 to the *Resolved* workflow state category or, if none is defined, then the *Completed* workflow state category.|
53
60
|`Fixes AB#123, Fixes AB#124, Fixes AB#125`| Links to Azure Boards work items 123, 124, and 126. Transitions all items to either the *Resolved* workflow state category or, if none is defined, then the *Completed* workflow state category. |
Copy file name to clipboardExpand all lines: docs/managed-devops-pools/configure-security.md
+38-4
Original file line number
Diff line number
Diff line change
@@ -450,12 +450,42 @@ The `permissionProfile` property can be set during pool creation only. Allowed v
450
450
451
451
## Key Vault configuration
452
452
453
-
Managed DevOps Pools offers the ability to fetch certificates from an Azure Key Vault during provisioning, which means the certificates will already exist on the machine by the time it runs your Azure DevOps pipelines. To use this feature, you must configure an [identity on your pool](configure-identity.md), and this identity must have **Key Vault Secrets User** permissions to fetch the secret from your Key Vault. To assign your identity to the **Key Vault Secrets User** role, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](/azure/key-vault/general/rbac-guide).
453
+
Managed DevOps Pools offers the ability to fetch certificates from an Azure Key Vault during provisioning, which means the certificates will already exist on the machine by the time it runs your pipelines.
454
+
455
+
To use this feature, you must:
456
+
- Configure an [identity on your pool](configure-identity.md), and this identity must have **Key Vault Secrets User** permissions to fetch the secret from your Key Vault. To assign your identity to the **Key Vault Secrets User** role, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](/azure/key-vault/general/rbac-guide).
457
+
458
+
- The principal configuring the Key Vault integration settings (if you are configuring the Key Vault settings, then your account) must have the **Key Vault Certificate User** role assignment on the Key Vault where the certificates are stored.
454
459
455
460
> [!NOTE]
456
461
> As of `api-version 2025-01-21`, if you use this feature you can only use a single identity on the pool. Support for multiple identities will be added soon.
457
462
>
458
463
> Only one identity can be used to fetch secrets from the Key Vault.
464
+
>
465
+
> Managed DevOps Pools certificate settings are set at the pool level, and some of the settings are specific for Windows or Linux. If your workflow requires both Linux and Windows images, you may have to divide them into multiple pools if you can't find a common set of certificate settings that work for both Windows and Linux.
466
+
467
+
The following settings configure the certificates fetched from your Key Vault.
468
+
469
+
- **Certificates** (`observedCertificates`)
470
+
471
+
Specify the certificates to be fetched from your Key Vault and installed on all machines in your pool.
472
+
473
+
- **Certificate store location** (`certificateStoreLocation`)
474
+
475
+
Specify the location to install the certificates on your agent.
476
+
477
+
- **Windows agents**: Specify `LocalMachine` or `CurrentUser`.
478
+
- **Linux agents**: **Certificate store location** is only support on Ubuntu distributions. Specify the disk path to store the certificates, for example `/var/lib/waagent/Microsoft.Azure.KeyVault/app1`.
479
+
For Ubuntu distributions, if you specify the trusted store location, for example `/usr/local/share/ca-certificates`, the certificate is added to that certificate store as root. For more information, see [Install a root CA certificate in the trust store](https://documentation.ubuntu.com/server/how-to/security/install-a-root-ca-certificate-in-the-trust-store/index.html).
480
+
481
+
- **Certificate store name** (`certificateStoreName`)
482
+
483
+
- **Windows agents**: Specify the name of the certificate store, either `My` (local certificate store - default if no name is specified) or `Root` (trusted root location).
484
+
- **Linux agents**: This setting isn't used on Linux agents.
485
+
486
+
- **Exportable private keys** (`keyExportable`)
487
+
488
+
Whether the key of the certificates is exportable. The default is `false`.
459
489
460
490
#### [Azure portal](#tab/azure-portal/)
461
491
@@ -470,6 +500,9 @@ Key Vault integration is configured in **Settings > Security**.
470
500
471
501
Azure Key Vault is configured in the `osProfile` section of the `fabricProfile` property. Set the `secretManagementSettings` to be able to access the desired certificate.
472
502
503
+
> [!NOTE]
504
+
> The `osProfile.certificateStoreName` property is only available in `apiVersion 2025-01-21` and later.
@@ -538,18 +572,18 @@ The following example shows the `osProfile` section of the **fabric-profile.json
538
572
539
573
### Configuring SecretManagementSettings
540
574
541
-
Certificates retrieved using the `SecretManagementSettings` on your pool will automatically sync with the most recent versions published within the Key Vault. These secrets will be on the machine by the time it runs any Azure DevOps pipeline, meaning you can save time and remove tasks for fetching certificates.
575
+
Certificates retrieved using the `SecretManagementSettings` on your pool will automatically sync with the most recent versions published within the Key Vault. These secrets will be on the machine by the time it runs its first pipeline, meaning you can save time and remove tasks for fetching certificates.
542
576
543
577
> [!IMPORTANT]
544
578
> Provisioning of your agent virtual machines will fail if the secret cannot be fetched from the Key Vault due to a permissions or network issue.
545
579
546
580
#### [Windows](#tab/windows/)
547
581
548
-
For Windows, the Certificate Store Location is allowed to either be set to `LocalMachine` or `CurrentUser`. This setting will ensure that the secret is installed at that location on the machine. For specific behavior of how secret retrieval works, see [the documentation for the Azure VMSS Key Vault extension for Windows](/azure/virtual-machines/extensions/key-vault-windows).
582
+
For Windows, the Certificate Store Location is allowed to either be set to `LocalMachine` or `CurrentUser`. This setting will ensure that the secret is installed at that location on the machine. For specific behavior of how secret retrieval works, see [Azure Key Vault extension for Windows](/azure/virtual-machines/extensions/key-vault-windows).
549
583
550
584
#### [Linux](#tab/linux/)
551
585
552
-
For Linux, the Certificate Store Location can be any directory on the machine, and the certificates will be downloaded and synced to that location. For specifics on default settings and secret behavior, see [the documentation for the Azure VMSS Key Vault extension for Linux](/azure/virtual-machines/extensions/key-vault-linux).
586
+
For Linux, the Certificate Store Location can be any directory on the machine, and the certificates will be downloaded and synced to that location. For specifics on default settings and secret behavior, see [Key Vault virtual machine extension for Linux](/azure/virtual-machines/extensions/key-vault-linux).
Copy file name to clipboardExpand all lines: docs/managed-devops-pools/features-timeline.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Features timeline and roadmap
3
3
description: Learn about new features in Managed DevOps Pools.
4
-
ms.date: 03/31/2025
4
+
ms.date: 04/25/2025
5
5
ms.topic: overview
6
6
#Customer intent: As a platform engineer, I want to understand the new features in Managed DevOps Pools.
7
7
---
@@ -12,13 +12,11 @@ ms.topic: overview
12
12
13
13
The following section describes new features in development for Managed DevOps Pools.
14
14
15
-
***Trusted root certificates**: Managed DevOps Pools is adding support so you can configure your pool to add certificates from your Key Vault as a trusted root certificate to your agents, so you don’t have to add a task for it to all the pipelines that use the pool. For more information, see [Key Vault configuration](./configure-security.md#key-vault-configuration). **Planned for April 2025.**
16
-
17
15
***Shorter time for agent allocation**: The Managed DevOps Pools team is making updates to shorten the startup time for [standby agents](./configure-scaling.md#standby-agent-mode) (**Fresh agent every time** setting). **Planned for April 2025.**
18
16
19
17
***Log analytics**: Managed DevOps Pools is adding support so you can configure your pools to emit logs into Log analytics. The Log Analytics tool in the Azure portal lets you run and edit log queries against data in the Azure Monitor Logs store. Use Log Analytics to analyze and visualize log data using [Kusto Query Language (KQL)](/azure/azure-monitor/logs/get-started-queries) or the point-and-click experience provided in [Log Analytics simple mode](/azure/azure-monitor/logs/log-analytics-simple-mode). **Planned for April 2025.**
20
18
21
-
***Pool creation at the Azure DevOps project level using project level permissions**: To create a Managed DevOps Pool, you must currently be an [Organization-level Agent pools administrator or a Project Collection Administrator in Azure DevOps](./prerequisites.md#verify-azure-devops-permissions). We're enabling a new mode of Managed DevOps Pools creation, requiring only Project-level Agent pools administrator. Managed DevOps Pools created using Project-level Agent pools administrator will be created and enabled only for use in the designated Azure DevOps Project. **Planned for April 2025.**
19
+
***Pool creation at the Azure DevOps project level using project level permissions**: To create a Managed DevOps Pool, you must currently be an [Organization-level Agent pools administrator or a Project Collection Administrator in Azure DevOps](./prerequisites.md#verify-azure-devops-permissions). We're enabling a new mode of Managed DevOps Pools creation, requiring only Project-level Agent pools administrator. Managed DevOps Pools created using Project-level Agent pools administrator will be created and enabled only for use in the designated Azure DevOps project. **Planned for April 2025.**
22
20
23
21
***Windows 2025 Azure Pipelines Image**: We're adding the [Windows Server 2025 image](https://github.com/actions/runner-images/blob/main/images/windows/Windows2025-Readme.md) to [Azure Pipelines images](./configure-images.md#azure-pipelines-images).
24
22
@@ -34,6 +32,8 @@ The following section describes new features in development for Managed DevOps P
34
32
35
33
***Open access for all pipelines to use a Managed DevOps Pool**: By default, each pipeline must be explicitly authorized to use a newly created Managed DevOps Pool. We're adding an option to enable [Open access for all pipelines](../pipelines/agents/pools-queues.md#pipeline-permissions) so that administrators don't need to explicitly authorize each pipeline. For more information, see [Configure open access for pipelines to your pool](./configure-security.md#configure-open-access-for-pipelines-to-your-pool).
36
34
35
+
***Trusted root certificates**: Managed DevOps Pools added support so you can configure your pool to add certificates from your Key Vault as a trusted root certificate to your agents, so you don’t have to add a task for it to all the pipelines that use the pool. For more information, see [Key Vault configuration](./configure-security.md#key-vault-configuration).
36
+
37
37
## March 2025
38
38
39
39
The following features were released in Managed DevOps Pools in March 2025.
Copy file name to clipboardExpand all lines: docs/managed-devops-pools/monitor-pool.md
+4-1
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Monitor
3
3
description: Learn how to view the health of your Managed DevOps Pools.
4
-
ms.date: 11/13/2024
4
+
ms.date: 04/25/2025
5
5
---
6
6
7
7
# Monitor Managed DevOps Pools
@@ -129,6 +129,9 @@ For a list of error codes, see the following [Error codes](#error-codes) section
129
129
|`SkuNotAvailable`| The requested VM size for resource 'Following SKUs failed for Capacity Restrictions:' is currently not available in location. Try another size or deploy to a different location or different zone. See `https://aka.ms/azureskunotavailable` for details. |
130
130
|`TaskCanceled`| The request was canceled due to the configured HttpClient.Timeout of 100 seconds elapsing. |
131
131
|`VirtualNetworkIsNotFound`| The Virtual Network might be deleted. |
132
+
|`WorkerSetupFailed`, `UnableToDownloadWorkerCheckNetwork`, `UnableToDownloadWorkerCheckNetwork[<endpoint>]`|[The Network infrastructure is blocking access to one of the prerequisite endpoints.](./configure-networking.md#restricting-outbound-connectivity)|
133
+
|`UnableToDownloadWorkerCheckNetwork_TLSIssue`|[TLS Handshake failed when contacting prerequisite endpoints.](./configure-networking.md#restricting-outbound-connectivity)|
0 commit comments