You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/azure-ad-authentication.md
+32-29Lines changed: 32 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,35 +11,33 @@ ms.reviewer: rijolly
11
11
12
12
Application Insights now supports [Microsoft Entra authentication](../../active-directory/authentication/overview-authentication.md). By using Microsoft Entra ID, you can ensure that only authenticated telemetry is ingested in your Application Insights resources.
13
13
14
-
Using various authentication systems can be cumbersome and risky because it's difficult to manage credentials at scale. You can now choose to [opt out of local authentication](#disable-local-authentication) to ensure only telemetry exclusively authenticated by using [managed identities](../../active-directory/managed-identities-azure-resources/overview.md) and [Microsoft Entra ID](../../active-directory/fundamentals/active-directory-whatis.md) is ingested in your resource. This feature is a step to enhance the security and reliability of the telemetry used to make critical operational ([alerting](../alerts/alerts-overview.md#what-are-azure-monitor-alerts)and [autoscale](../autoscale/autoscale-overview.md#overview-of-autoscale-in-azure)) and business decisions.
14
+
Using various authentication systems can be cumbersome and risky because it's difficult to manage credentials at scale. You can now choose to [opt out of local authentication](#disable-local-authentication) to ensure only telemetry exclusively authenticated by using [managed identities](../../active-directory/managed-identities-azure-resources/overview.md) and [Microsoft Entra ID](../../active-directory/fundamentals/active-directory-whatis.md) is ingested in your resource. This feature is a step to enhance the security and reliability of the telemetry used to make critical operational ([alerting](../alerts/alerts-overview.md#what-are-azure-monitor-alerts)and [autoscaling](../autoscale/autoscale-overview.md#overview-of-autoscale-in-azure)) and business decisions.
15
15
16
16
> [!NOTE]
17
-
> Note
18
-
> This document covers data ingestion into Application Insights using Microsoft Entra ID. authentication. For information on querying data within Application Insights, see [Query Application Insights using Microsoft Entra authentication](./app-insights-azure-ad-api.md).
17
+
> This document covers data ingestion into Application Insights using Microsoft Entra ID-based authentication. For information on querying data within Application Insights, see [Query Application Insights using Microsoft Entra authentication](./app-insights-azure-ad-api.md).
19
18
20
19
## Prerequisites
21
-
>
22
20
23
-
The following prerequisites enable Microsoft Entra authenticated ingestion. You need to:
21
+
The following preliminary steps are required to enable Microsoft Entra authenticated ingestion. You need to:
Microsoft Entra authentication is only available for Application Insights Java Agent greater than or equal to 3.2.0.
39
37
-[ApplicationInsights JavaScript web SDK](javascript.md).
40
38
-[Application Insights OpenCensus Python SDK](/previous-versions/azure/azure-monitor/app/opencensus-python) with Python version 3.4 and 3.5.
41
39
-[Certificate/secret-based Microsoft Entra ID](../../active-directory/authentication/active-directory-certificate-based-authentication-get-started.md) isn't recommended for production. Use managed identities instead.
42
-
- On-by-default codeless monitoring (for languages) for Azure App Service, Azure Virtual Machines/Azure Virtual Machine Scale Sets, and Azure Functions.
40
+
- On-by-default [autoinstrumentation/codeless monitoring](codeless-overview.md) (for languages) for Azure App Service, Azure Virtual Machines/Azure Virtual Machine Scale Sets, and Azure Functions.
43
41
-[Availability tests](availability-overview.md).
44
42
-[Profiler](profiler-overview.md).
45
43
@@ -75,10 +73,10 @@ Application Insights .NET SDK supports the credential classes provided by [Azure
75
73
76
74
- We recommend `DefaultAzureCredential` for local development.
77
75
- We recommend `ManagedIdentityCredential` for system-assigned and user-assigned managed identities.
78
-
- For system-assigned, use the default constructor without parameters.
79
-
- For user-assigned, provide the client ID to the constructor.
76
+
- For system-assigned, use the default constructor without parameters.
77
+
- For user-assigned, provide the client ID to the constructor.
80
78
- We recommend `ClientSecretCredential` for service principals.
81
-
- Provide the tenant ID, client ID, and client secret to the constructor.
79
+
- Provide the tenant ID, client ID, and client secret to the constructor.
82
80
83
81
The following example shows how to manually create and configure `TelemetryConfiguration` by using .NET:
1. Add the JSON configuration to the *ApplicationInsights.json* configuration file depending on the authentication you're using. We recommend using managed identities.
151
149
152
150
> [!NOTE]
153
-
> For more information about migrating from the 2.X SDK to the 3.X Java agent, see [Upgrading from Application Insights Java 2.x SDK](java-standalone-upgrade-from-2x.md).
151
+
> For more information about migrating from the `2.X` SDK to the `3.X` Java agent, see [Upgrading from Application Insights Java 2.x SDK](java-standalone-upgrade-from-2x.md).
154
152
155
153
#### System-assigned managed identity
156
154
@@ -180,6 +178,7 @@ The following example shows how to configure the Java agent to use user-assigned
180
178
}
181
179
}
182
180
```
181
+
183
182
:::image type="content" source="media/azure-ad-authentication/user-assigned-managed-identity.png" alt-text="Screenshot that shows user-assigned managed identity." lightbox="media/azure-ad-authentication/user-assigned-managed-identity.png":::
184
183
185
184
#### Client secret
@@ -198,6 +197,7 @@ The following example shows how to configure the Java agent to use a service pri
198
197
}
199
198
}
200
199
```
200
+
201
201
:::image type="content" source="media/azure-ad-authentication/client-secret-tenant-id.png" alt-text="Screenshot that shows the client secret with the tenant ID and the client ID." lightbox="media/azure-ad-authentication/client-secret-tenant-id.png":::
202
202
203
203
:::image type="content" source="media/azure-ad-authentication/client-secret-cs.png" alt-text="Screenshot that shows the Client secrets section with the client secret." lightbox="media/azure-ad-authentication/client-secret-cs.png":::
@@ -206,17 +206,17 @@ The following example shows how to configure the Java agent to use a service pri
206
206
207
207
The `APPLICATIONINSIGHTS_AUTHENTICATION_STRING` environment variable lets Application Insights authenticate to Microsoft Entra ID and send telemetry.
| APPLICATIONINSIGHTS_AUTHENTICATION_STRING |`Authorization=AAD;ClientId={Client id of the User-Assigned Identity}`|
217
+
| App setting | Value |
218
+
| ------------- | -------- |
219
+
| APPLICATIONINSIGHTS_AUTHENTICATION_STRING |`Authorization=AAD;ClientId={Client id of the User-Assigned Identity}`|
220
220
221
221
Set the `APPLICATIONINSIGHTS_AUTHENTICATION_STRING` environment variable using this string.
222
222
@@ -242,7 +242,7 @@ is included starting with beta version [opencensus-ext-azure 1.1b0](https://pypi
242
242
243
243
Construct the appropriate [credentials](/python/api/overview/azure/identity-readme#credentials) and pass them into the constructor of the Azure Monitor exporter. Make sure your connection string is set up with the instrumentation key and ingestion endpoint of your resource.
244
244
245
-
The `OpenCensus`` Azure Monitor exporters support these authentication types. We recommend using managed identities in production environments.
245
+
The `OpenCensus` Azure Monitor exporters support these authentication types. We recommend using managed identities in production environments.
246
246
247
247
#### System-assigned managed identity
248
248
@@ -300,6 +300,7 @@ tracer = Tracer(
300
300
)
301
301
...
302
302
```
303
+
303
304
---
304
305
305
306
## Disable local authentication
@@ -444,7 +445,7 @@ When developing a custom client to obtain an access token from Microsoft Entra I
444
445
445
446
If you're using sovereign clouds, you can find the audience information in the connection string as well. The connection string follows this structure:
The audience parameter, AADAudience, may vary depending on your specific environment.
450
451
@@ -486,7 +487,7 @@ Next, you should review the Application Insights resource's access control. The
486
487
The Application Insights .NET SDK emits error logs by using the event source. To learn more about collecting event source logs, see [Troubleshooting no data - collect logs with PerfView](asp-net-troubleshoot-no-data.md#PerfView).
487
488
488
489
If the SDK fails to get a token, the exception message is logged as
489
-
`Failed to get AAD Token. Error message:`.
490
+
`Failed to get AAD Token. Error message:`.
490
491
491
492
### [Node.js](#tab/nodejs)
492
493
@@ -531,6 +532,7 @@ If the following WARN message is seen in the log file `WARN c.m.a.TelemetryChann
531
532
If you're using Fiddler, you might see the response header `HTTP/1.1 403 Forbidden - provided credentials do not grant the access to ingest the telemetry into the component`.
532
533
533
534
The root cause might be one of the following reasons:
535
+
534
536
- You've created the resource with a system-assigned managed identity or associated a user-assigned identity with it. However, you might have forgotten to add the Monitoring Metrics Publisher role to the resource (if using SAMI) or the user-assigned identity (if using UAMI).
535
537
- You've provided the right credentials to get the access tokens, but the credentials don't belong to the right Application Insights resource. Make sure you see your resource (VM or app service) or user-assigned identity with Monitoring Metrics Publisher roles in your Application Insights resource.
536
538
@@ -567,8 +569,9 @@ You're probably missing a credential or your credential is set to `None`, but yo
567
569
This error usually occurs when the provided credentials don't grant access to ingest telemetry for the Application Insights resource. Make sure your Application Insights resource has the correct role assignments.
568
570
569
571
---
572
+
570
573
## Next steps
571
574
572
-
*[Monitor your telemetry in the portal](overview-dashboard.md)
573
-
*[Diagnose with Live Metrics Stream](live-stream.md)
574
-
*[Query Application Insights using Microsoft Entra authentication](./app-insights-azure-ad-api.md)
575
+
-[Monitor your telemetry in the portal](overview-dashboard.md)
576
+
-[Diagnose with Live Metrics Stream](live-stream.md)
577
+
-[Query Application Insights using Microsoft Entra authentication](./app-insights-azure-ad-api.md)
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/api/cross-workspace-queries.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,9 @@ For either implicit or explicit cross-workspace queries, you need to specify the
21
21
- Workspace ID - GUID string
22
22
- Azure Resource ID - string with format /subscriptions/\<subscriptionId\>/resourceGroups/\<resourceGroup\>/providers/ microsoft.operationalinsights/workspaces/\<workspaceName\>
23
23
24
+
> [!NOTE]
25
+
> We strongly recommend identifying a workspace by its unique Workspace ID or Azure Resource ID because they remove ambiguity and are more performant.
26
+
24
27
## Implicit cross workspace queries
25
28
26
29
For implicit syntax, specify the workspaces that you want to include in your query scope. The API performs a single query over each application provided in your list. The syntax for a cross-workspace POST is:
Data-out replication allows you to synchronize data out of a Azure Database for MySQL flexible server to another MySQL server using MySQL native replication. The MySQL server (replica) can be on-premises, in virtual machines, or a database service hosted by other cloud providers. While [Data-in replication](concepts-data-in-replication.md) helps to move data into an Azure Database for MySQL flexible server (replica), Data-out replication would allow you to transfer data out of an Azure Database for MySQL flexible server (Primary). With Data-out replication, the binary log (binlog) is made community consumable allowing the an Azure Database for MySQL flexible server to act as a Primary server for the external replicas. To learn more about binlog replication, see the [MySQL binlog replication overview](https://dev.mysql.com/doc/refman/5.7/en/binlog-replication-configuration-overview.html).
17
+
Data-out replication allows you to synchronize data out of an Azure Database for MySQL flexible server to another MySQL server using MySQL native replication. The MySQL server (replica) can be on-premises, in virtual machines, or a database service hosted by other cloud providers. While [Data-in replication](concepts-data-in-replication.md) helps to move data into an Azure Database for MySQL flexible server (replica), Data-out replication would allow you to transfer data out of an Azure Database for MySQL flexible server (Primary). With Data-out replication, the binary log (binlog) is made community consumable allowing the an Azure Database for MySQL flexible server to act as a Primary server for the external replicas. To learn more about binlog replication, see the [MySQL binlog replication overview](https://dev.mysql.com/doc/refman/5.7/en/binlog-replication-configuration-overview.html).
18
18
19
19
> [!NOTE]
20
20
> Data-out replication is not supported on Azure Database for MySQL - Flexible Server, which has Azure authentication configured.
Copy file name to clipboardExpand all lines: articles/mysql/flexible-server/sample-scripts-azure-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ The following table includes links to sample Azure CLI scripts for Azure Databas
19
19
| Sample link | Description |
20
20
|---|---|
21
21
|**Create and connect to a server**||
22
-
|[Create a server and enable public access connectivity](scripts/sample-cli-create-connect-public-access.md)| Creates a Azure Database for MySQL - Flexible Server, configures a server-level firewall rule (public access connectivity method) and connects to the server. |
22
+
|[Create a server and enable public access connectivity](scripts/sample-cli-create-connect-public-access.md)| Creates an Azure Database for MySQL - Flexible Server, configures a server-level firewall rule (public access connectivity method) and connects to the server. |
23
23
|[Create a server and enable private access connectivity (VNet Integration)](scripts/sample-cli-create-connect-private-access.md)| Creates an Azure Database for MySQL - Flexible Server in a VNet (private access connectivity method) and connects to the server through a VM within the VNet. |
24
24
|**Monitor and scale**||
25
25
|[Monitor metrics and scale a server](scripts/sample-cli-monitor-and-scale.md)| Monitors and scales a single Azure Database for MySQL - Flexible server up or down to allow for changing performance needs. |
Copy file name to clipboardExpand all lines: articles/mysql/single-server/how-to-configure-private-link-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ az vm create \
72
72
73
73
## Create an Azure Database for MySQL server
74
74
75
-
Create a Azure Database for MySQL with the az mysql server create command. Remember that the name of your MySQL Server must be unique across Azure, so replace the placeholder value in brackets with your own unique value:
75
+
Create an Azure Database for MySQL with the az mysql server create command. Remember that the name of your MySQL Server must be unique across Azure, so replace the placeholder value in brackets with your own unique value:
0 commit comments