Skip to content

Commit 78b9856

Browse files
authored
fix broken links (#47999)
1 parent 81a5a0c commit 78b9856

File tree

3 files changed

+22
-31
lines changed

3 files changed

+22
-31
lines changed

docs/core/diagnostics/faq-dumps.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ metadata:
55
ms.topic: faq
66
ms.date: 10/07/2022
77
title: FAQ for dumps
8-
summary: This articleanswerscommonlyaskedquestionsaboutcollecting dumps in .NET.
9-
10-
sections:
11-
- name: Collecting dumps on macOS and Linux
12-
questions:
8+
summary: This article answers commonly asked questions about collecting dumps in .NET.
9+
10+
sections:
11+
- name: Collecting dumps on macOS and Linux
12+
questions:
1313
- question: |
1414
Why is dump collection failing on Linux?
1515
answer: |
@@ -19,7 +19,7 @@ sections:
1919
[createdump] The process or container does not have permissions or access: open(/proc/1234/mem) FAILED Permission denied (13)
2020
```
2121
22-
One reason that access can be denied is if a security sandbox intercepts the call using a [seccomp BPF filter](https://www.kernel.org/doc/html/v4.19/userspace-api/seccomp_filter.html). For applications running in a container using Open Container Initiative technology, the `seccomp` profile must allow for calls to `ptrace`. For example, `Docker` uses [containerd](https://github.com/moby/containerd) under the hood as a container runtime. When initializing, it specifies a default [seccomp profile](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json) that allows `ptrace` only if the container host has a kernel version higher than 4.8 or if the `CAP_SYS_PTRACE` capability was specified on the container.
22+
One reason that access can be denied is if a security sandbox intercepts the call using a [seccomp BPF filter](https://www.kernel.org/doc/html/v4.19/userspace-api/seccomp_filter.html). For applications running in a container using Open Container Initiative technology, the `seccomp` profile must allow for calls to `ptrace`. For example, `Docker` uses [containerd](https://github.com/moby/containerd) under the hood as a container runtime. When initializing, it specifies a default [seccomp profile](https://github.com/moby/moby/blob/master/vendor/github.com/moby/profiles/seccomp/default.json) that allows `ptrace` only if the container host has a kernel version higher than 4.8 or if the `CAP_SYS_PTRACE` capability was specified on the container.
2323
2424
If the calls aren't intercepted, then the kernel does a variety of built-in access checks. The docs for [ptrace()](https://www.man7.org/linux/man-pages/man2/ptrace.2.html) include a detailed description near the end, titled "Ptrace access mode checking", that describes how these are done. Accessing the /proc filesystem also uses a variation of the same ptrace access mode checking. What follows is an abbreviated summary of the security checks performed and places where access might be denied:
2525
@@ -50,22 +50,22 @@ sections:
5050
- question: |
5151
Why can't I collect dumps when running inside a container?
5252
answer: |
53-
For applications running under any Open Container Initiative technology, the `seccomp` profile must allow for calls to [ptrace()](https://www.man7.org/linux/man-pages/man2/ptrace.2.html). For example, `Docker` uses [containerd](https://github.com/moby/containerd) under the hood as a container runtime. When initializing the runtime, it specifies a default [seccomp profile](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json) that allows `ptrace` only if the container host has a kernel version higher than 4.8 or if the `CAP_SYS_PTRACE` capability was specified.
53+
For applications running under any Open Container Initiative technology, the `seccomp` profile must allow for calls to [ptrace()](https://www.man7.org/linux/man-pages/man2/ptrace.2.html). For example, `Docker` uses [containerd](https://github.com/moby/containerd) under the hood as a container runtime. When initializing the runtime, it specifies a default [seccomp profile](https://github.com/moby/moby/blob/master/vendor/github.com/moby/profiles/seccomp/default.json) that allows `ptrace` only if the container host has a kernel version higher than 4.8 or if the `CAP_SYS_PTRACE` capability was specified.
5454
5555
For a fuller description of how Linux security policies impact dump collection, see the question 'Why is dump collection failing on Linux?'.
5656
- question: |
5757
Why can't I collect dumps on macOS?
5858
answer: |
5959
On macOS the use of `ptrace` requires the host of the target process to be properly entitled. For information about the minimum required entitlements, see [Default entitlements](../install/macos-notarization-issues.md#default-entitlements).
60-
60+
6161
- question: |
6262
Where can I learn more about how I can leverage dumps to help diagnose problems in my .NET application?
63-
answer: |
63+
answer: |
6464
Here are some additional resources:
6565
66-
* [Debug Linux dumps](debug-linux-dumps.md)
67-
* [Debug a deadlock in a .NET app](debug-deadlock.md)
68-
66+
* [Debug Linux dumps](debug-linux-dumps.md)
67+
* [Debug a deadlock in a .NET app](debug-deadlock.md)
68+
6969
- question: |
7070
How can I solve "It was not possible to find any compatible framework version"
7171
answer: |

docs/framework/wcf/feature-details/hosting-workflow-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ A workflow service must be hosted for it to respond to incoming messages. Workfl
5252

5353
## Deployment
5454

55-
The Web Deployment tool has been created to make the job of deployment easier. The tool allows you to migrate applications between IIS 6.0 and IIS 7.0, synchronize server farms, and package, archive, and deploy Web applications. For more information, see [Web Deploy Tool](https://iis-umbraco.azurewebsites.net/downloads/microsoft/web-deploy).
55+
The Web Deployment tool was created to make the job of deployment easier. The tool allows you to migrate applications between IIS 6.0 and IIS 7.0, synchronize server farms, and package, archive, and deploy Web applications. For more information, see [Web Deploy Tool](https://www.iis.net/downloads/microsoft/web-deploy).
5656

5757
## See also
5858

docs/framework/wcf/feature-details/routing-service.md

Lines changed: 9 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,8 @@ The <xref:System.ServiceModel.Routing.RoutingService> is implemented as a Window
1313
- Content-based routing
1414

1515
- Service aggregation
16-
1716
- Service versioning
18-
1917
- Priority routing
20-
2118
- Dynamic configuration
2219

2320
- Protocol bridging
@@ -33,24 +30,21 @@ While it is possible to create an intermediary service that accomplishes one or
3330
The Routing Service provides a generic, dynamically configurable, pluggable SOAP intermediary that is compatible with the WCF Service and Channel models and allows you to perform content-based routing of SOAP-based messages.
3431

3532
> [!NOTE]
36-
> The Routing Service does not currently support routing of WCF REST services. To route REST calls, consider using <xref:System.Web.Routing> or [Application Request Routing](https://iis-umbraco.azurewebsites.net/downloads/microsoft/application-request-routing).
33+
> The Routing Service does not currently support routing of WCF REST services. To route REST calls, consider using <xref:System.Web.Routing> or [Application Request Routing](https://www.iis.net/downloads/microsoft/application-request-routing).
3734
3835
## Content-Based Routing
3936

4037
Content-based routing is the ability to route a message based on one or more values contained within the message. The Routing Service inspects each message and routes it to the destination endpoint based on the message contents and the routing logic you create. Content-based routing provides the basis for service aggregation, service versioning, and priority routing.
4138

42-
To implement content-based routing, the Routing Service relies on <xref:System.ServiceModel.Dispatcher.MessageFilter> implementations that are used to match specific values within the messages to be routed. If a **MessageFilter** matches a message, the message is routed to the destination endpoint associated with the **MessageFilter**. Message filters are grouped together into filter tables (<xref:System.ServiceModel.Routing.Configuration.FilterTableCollection>) to construct complex routing logic. For example, a filter table might contain five mutually exclusive message filters that cause messages to be routed to only one of the five destination endpoints.
39+
To implement content-based routing, the Routing Service relies on <xref:System.ServiceModel.Dispatcher.MessageFilter> implementations that are used to match specific values within the messages to be routed. If a **MessageFilter** matches a message, the message is routed to the destination endpoint associated with the **MessageFilter**. Message filters are grouped together into filter tables (<xref:System.ServiceModel.Routing.Configuration.FilterTableCollection>) to construct complex routing logic. For example, a filter table might contain five mutually exclusive message filters that cause messages to be routed to only one of the five destination endpoints.
4340

4441
The Routing Service allows you to configure the logic that is used to perform content-based routing, as well as dynamically update the routing logic at run time.
4542

4643
Through the grouping of message filters into filter tables, routing logic can be constructed that allows you to handle multiple routing scenarios such as:
4744

4845
- Service aggregation
49-
5046
- Service versioning
51-
5247
- Priority routing
53-
5448
- Dynamic configuration
5549

5650
For more information about message filters and filter tables, see [Routing Introduction](routing-introduction.md) and [Message Filters](message-filters.md).
@@ -87,9 +81,9 @@ For more information about SOAP processing, see [Routing Introduction](routing-i
8781

8882
## Error Handling
8983

90-
In a system composed of distributed services that rely on network communications, it is important to ensure that communications within your system are resistant to transient network failures. The Routing Service implements error handling that allows you to handle many communication failure scenarios that might otherwise result in a service outage.
84+
In a system composed of distributed services that rely on network communications, it is important to ensure that communications within your system are resistant to transient network failures. The Routing Service implements error handling that allows you to handle many communication failure scenarios that might otherwise result in a service outage.
9185

92-
If the Routing Service encounters a <xref:System.ServiceModel.CommunicationException> while attempting to send a message, error handling will take place. These exceptions typically indicate that a problem was encountered while attempting to communicate with the defined client endpoint, such as an <xref:System.ServiceModel.EndpointNotFoundException>, <xref:System.ServiceModel.ServerTooBusyException>, or <xref:System.ServiceModel.CommunicationObjectFaultedException>. The error-handling code will also catch and attempt to retry sending when a **TimeoutException** occurs, which is another common exception that is not derived from **CommunicationException**.
86+
If the Routing Service encounters a <xref:System.ServiceModel.CommunicationException> while attempting to send a message, error handling will take place. These exceptions typically indicate that a problem was encountered while attempting to communicate with the defined client endpoint, such as an <xref:System.ServiceModel.EndpointNotFoundException>, <xref:System.ServiceModel.ServerTooBusyException>, or <xref:System.ServiceModel.CommunicationObjectFaultedException>. The error-handling code will also catch and attempt to retry sending when a **TimeoutException** occurs, which is another common exception that is not derived from **CommunicationException**.
9387

9488
For more information about error handling, see [Routing Introduction](routing-introduction.md).
9589

@@ -101,15 +95,12 @@ For more information about backup endpoints, see [Routing Introduction](routing-
10195

10296
## Streaming
10397

104-
The routing service can successfully stream messages if you set the binding to support streaming. However, there are some conditions under which messages may need to buffered:
105-
106-
- Multicast (buffer to create additional message copies)
107-
108-
- Failover (buffer in case the message needs to be sent to a backup)
98+
The routing service can successfully stream messages if you set the binding to support streaming. However, there are some conditions under which messages may need to buffered:
10999

110-
- System.ServiceModel.Routing.RoutingConfiguration.RouteOnHeadersOnly is false (buffer to present the MessageFilterTable with a MessageBuffer so that filters can inspect the body)
111-
112-
- Dynamic configuration
100+
- Multicast (buffer to create additional message copies).
101+
- Failover (buffer in case the message needs to be sent to a backup).
102+
- System.ServiceModel.Routing.RoutingConfiguration.RouteOnHeadersOnly is false (buffer to present the MessageFilterTable with a MessageBuffer so that filters can inspect the body).
103+
- Dynamic configuration.
113104

114105
## See also
115106

0 commit comments

Comments
 (0)