You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/upgrade-hcx-azure-vmware-solutions.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,9 @@ You can update HCX Connector and HCX Cloud systems during separate maintenance w
27
27
28
28
- As part of HCX update planning, and to ensure that HCX components are updated successfully, review the service update considerations and requirements. For planning HCX upgrade, see [Planning for HCX Updates](https://docs.vmware.com/en/VMware-HCX/4.5/hcx-user-guide/GUID-61F5CED2-C347-4A31-8ACB-A4553BFC62E3.html).
29
29
30
-
- Ensure that you have a backup and snapshot of HCX connector in the on-premises environment, if applicable.
30
+
- Ensure that you have a backup and snapshot of HCX connector in the on-premises environment, if applicable.
31
+
- For more information, see the [HCX support policy for legacy vSphere environment](https://kb.vmware.com/s/article/82702).
32
+
- Check that you are using the [latest VMware HCX version validated with Azure VMware Solution](introduction.md#vmware-software-versions).
Copy file name to clipboardExpand all lines: articles/key-vault/general/overview-vnet-service-endpoints.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,6 +65,7 @@ Here's a list of trusted services that are allowed to access a key vault if the
65
65
| Azure Disk Encryption volume encryption service|Allow access to BitLocker Key (Windows VM) or DM Passphrase (Linux VM), and Key Encryption Key, during virtual machine deployment. This enables [Azure Disk Encryption](../../security/fundamentals/encryption-overview.md).|
66
66
| Azure Disk Storage | When configured with a Disk Encryption Set (DES). For more information, see [Server-side encryption of Azure Disk Storage using customer-managed keys](../../virtual-machines/disk-encryption.md#customer-managed-keys).|
67
67
| Azure Event Hubs|[Allow access to a key vault for customer-managed keys scenario](../../event-hubs/configure-customer-managed-key.md)|
68
+
| Azure ExpressRoute |[When using MACsec with ExpressRoute Direct](../../expressroute/expressroute-howto-macsec.md)|
| Azure Front Door Classic|[Using Key Vault certificates for HTTPS](../../frontdoor/front-door-custom-domain-https.md#prepare-your-key-vault-and-certificate)
70
71
| Azure Front Door Standard/Premium|[Using Key Vault certificates for HTTPS](../../frontdoor/standard-premium/how-to-configure-https-custom-domain.md#prepare-your-key-vault-and-certificate)
Copy file name to clipboardExpand all lines: articles/sentinel/sap/deploy-sap-btp-solution.md
+59-8Lines changed: 59 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,11 +25,7 @@ Before you begin, verify that:
25
25
- Your organization uses SAP BTP (in a Cloud Foundry environment) to streamline interactions with SAP applications and other business applications.
26
26
- You have an SAP BTP account (which supports BTP accounts in the Cloud Foundry environment). You can also use a [SAP BTP trial account](https://cockpit.hanatrial.ondemand.com/).
27
27
- You have the SAP BTP auditlog-management service and service key (see [Set up the BTP account and solution](#set-up-the-btp-account-and-solution)).
28
-
- You can create an [Azure function app](../../azure-functions/functions-overview.md) by using the Microsoft.Web/Sites, Microsoft.Web/ServerFarms, Microsoft.Insights/Components, and Microsoft.Storage/StorageAccounts permissions.
29
-
- You can create [data collection rules and endpoints](../../azure-monitor/essentials/data-collection-rule-overview.md) by using these permissions:
30
-
- Microsoft.Insights/DataCollectionEndpoints and Microsoft.Insights/DataCollectionRules.
31
-
- Assign the Monitoring Metrics Publisher role to the function app.
32
-
- You have an [Azure Key Vault](../../key-vault/general/overview.md) to hold the SAP BTP client secret.
28
+
- You have the Microsoft Sentinel Contributor role on the target Microsoft Sentinel workspace.
33
29
34
30
## Set up the BTP account and solution
35
31
@@ -69,14 +65,14 @@ To set up the BTP account and the solution:
69
65
1. Select the resource group and the Microsoft Sentinel workspace in which to deploy the solution.
70
66
1. Select **Next** until you pass validation, and then select **Create**.
71
67
1. When the solution deployment is finished, return to your Microsoft Sentinel workspace and select **Data connectors**.
72
-
1. In the search bar, enter **BTP**, and then select **SAP BTP (using Azure Function)**.
68
+
1. In the search bar, enter **BTP**, and then select **SAP BTP**.
73
69
1. Select **Open connector page**.
74
-
1. On the connector page, make sure that you meet the required prerequisites and complete the configuration steps. In step 2 of the data connector configuration, specify the parameters that you defined in step 4 in this section.
70
+
1. On the connector page, make sure that you meet the required prerequisites listed and complete the configuration steps. When you're ready, select **Add account**.
71
+
1. Specify the parameters that you defined earlier during the configuration. The subaccount name specified is projected as a column in the `SAPBTPAuditLog_CL` table, and can be used to filter the logs when you have multiple subaccounts.
75
72
76
73
> [!NOTE]
77
74
> Retrieving audits for the global account doesn't automatically retrieve audits for the subaccount. Follow the connector configuration steps for each of the subaccounts you want to monitor, and also follow these steps for the global account. Review these [account auditing configuration considerations](#consider-your-account-auditing-configurations).
78
75
79
-
1. Complete all configuration steps, including the function app deployment and the Azure Key Vault access policy configuration.
80
76
1. Make sure that BTP logs are flowing into the Microsoft Sentinel workspace:
81
77
82
78
1. Sign in to your BTP subaccount and run a few activities that generate logs, such as sign-ins, adding users, changing permissions, and changing settings.
@@ -105,6 +101,61 @@ You also can retrieve the logs via the UI:
105
101
1. In the new instance, create a service key.
106
102
1. View the service key and retrieve the required parameters from step 4 of the configuration instructions in the data connector UI (**url**, **uaa.url**, **uaa.clientid**, and **uaa.clientsecret**).
107
103
104
+
## Rotate the BTP client secret
105
+
106
+
We recommend that you periodically rotate the BPT subaccount client secrets. The following sample script demonstrates the process of updating an existing data connector with a new secret fetched from Azure Key Vault.
107
+
108
+
Before you start, collect the values you'll need for the scripts parameters, including:
109
+
110
+
- The subscription ID, resource group, and workspace name for your Microsoft Sentinel workspace.
111
+
- The key vault and the name of the key vault secret.
112
+
- The name of the data connector you want to update with a new secret. To identify the data connector name, open the SAP BPT data connector in the Microsoft Sentinel data connectors page. The data connector name has the following syntax: *BTP_{connector name}*
0 commit comments