You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/threat-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ The smart lockout feature uses many factors to determine when an account should
55
55
- Passwords such as 12456! and 1234567! (or newAccount1234 and newaccount1234) are so similar that the algorithm interprets them as human error and counts them as a single try.
56
56
- Larger variations in pattern, such as 12456! and ABCD2!, are counted as separate tries.
57
57
58
-
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://password-generator.net/`.
58
+
When testing the smart lockout feature, use a distinctive pattern for each password you enter. Consider using password generation web apps, such as `https://password-gen.com/`.
59
59
60
60
When the smart lockout threshold is reached, you'll see the following message while the account is locked: **Your account is temporarily locked to prevent unauthorized use. Try again later**. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-create-new-alert-rule.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -282,6 +282,7 @@ You can create a new alert rule using the [Azure CLI](/cli/azure/get-started-wit
282
282
### [Log alert](#tab/log)
283
283
284
284
To create a log alert rule that monitors count of system event errors:
285
+
285
286
```azurecli
286
287
az monitor scheduled-query create -g {ResourceGroup} -n {nameofthealert} --scopes {vm_id} --condition "count \'union Event, Syslog | where TimeGenerated > a(1h) | where EventLevelName == \"Error\" or SeverityLevel== \"err\"\' > 2" --description {descriptionofthealert}
287
288
```
@@ -299,10 +300,10 @@ You can create a new alert rule using the [Azure CLI](/cli/azure/get-started-wit
299
300
- [az monitor activity-log alert action-group](/cli/azure/monitor/activity-log/alert/action-group): Add an action group to the activity log alert rule.
300
301
301
302
---
302
-
303
303
## Create a new alert rule using PowerShell
304
304
305
305
- To create a metric alert rule using PowerShell, use this cmdlet: [Add-AzMetricAlertRuleV2](/powershell/module/az.monitor/add-azmetricalertrulev2)
306
+
- To create a log alert rule using PowerShell, use this cmdlet: [New-AzScheduledQueryRule](/powershell/module/az.monitor/new-azscheduledqueryrule)
306
307
- To create an activity log alert rule using PowerShell, use this cmdlet: [Set-AzActivityLogAlert](/powershell/module/az.monitor/set-azactivitylogalert)
307
308
308
309
## Create an activity log alert rule from the Activity log pane
@@ -450,7 +451,7 @@ The *sampleActivityLogAlert.parameters.json* file contains the values provided f
450
451
451
452
## Changes to log alert rule creation experience
452
453
453
-
If you're creating a new log alert rule, please note that current alert rule wizard is a little different from the earlier experience:
454
+
If you're creating a new log alert rule, note that current alert rule wizard is a little different from the earlier experience:
454
455
455
456
- Previously, search results were included in the payload of the triggered alert and its associated notifications. The email included only 10 rows from the unfiltered results while the webhook payload contained 1000 unfiltered results. To get detailed context information about the alert so that you can decide on the appropriate action:
456
457
- We recommend using [Dimensions](alerts-types.md#narrow-the-target-using-dimensions). Dimensions provide the column value that fired the alert, giving you context for why the alert fired and how to fix the issue.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-manage-alert-rules.md
+27-72Lines changed: 27 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,45 +49,20 @@ To enable recommended alert rules:
49
49
50
50
## Manage metric alert rules with the Azure CLI
51
51
52
-
This section describes how to do manage metric alert rules using the cross-platform [Azure CLI](/cli/azure/get-started-with-azure-cli). The following examples use [Azure Cloud Shell](../../cloud-shell/overview.md).
52
+
This section describes how to manage metric alert rules using the cross-platform [Azure CLI](/cli/azure/get-started-with-azure-cli). The following examples use [Azure Cloud Shell](../../cloud-shell/overview.md).
53
53
54
54
1. In the [portal](https://portal.azure.com/), select **Cloud Shell**.
55
-
56
-
You can use commands with ``--help`` option to learn more about the command and how to use it. For example, the following command shows you the list of commands available for creating, viewing, and managing metric alerts.
57
-
58
-
```azurecli
59
-
az monitor metrics alert --help
60
-
```
61
-
62
-
### View all the metric alerts in a resource group
63
-
64
-
```azurecli
65
-
az monitor metrics alert list -g {ResourceGroup}
66
-
```
67
-
68
-
### See the details of a particular metric alert rule
69
-
70
-
Use the name or the resource ID of the rule in the following commands:
71
-
72
-
```azurecli
73
-
az monitor metrics alert show -g {ResourceGroup} -n {AlertRuleName}
74
-
```
75
-
76
-
```azurecli
77
-
az monitor metrics alert show --ids {RuleResourceId}
|Learn more about the command|`az monitor metrics alert --help`|
91
66
92
67
## Manage metric alert rules with PowerShell
93
68
@@ -115,41 +90,17 @@ This section describes how to manage log alerts using the cross-platform [Azure
115
90
116
91
117
92
1. In the [portal](https://portal.azure.com/), select **Cloud Shell**.
118
-
119
-
You can use commands with ``--help`` option to learn more about the command and how to use it. For example, the following command shows you the list of commands available for creating, viewing, and managing log alerts.
120
-
121
-
```azurecli
122
-
az monitor scheduled-query --help
123
-
```
124
-
125
-
### View all the log alert rules in a resource group
126
-
127
-
```azurecli
128
-
az monitor scheduled-query list -g {ResourceGroup}
129
-
```
130
-
131
-
### See the details of a log alert rule
132
-
133
-
Use the name or the resource ID of the rule in the following command:
134
-
135
-
```azurecli
136
-
az monitor scheduled-query show -g {ResourceGroup} -n {AlertRuleName}
137
-
```
138
-
```azurecli
139
-
az monitor scheduled-query show --ids {RuleResourceId}
140
-
```
141
-
142
-
### Disable a log alert rule
143
-
144
-
```azurecli
145
-
az monitor scheduled-query update -g {ResourceGroup} -n {AlertRuleName} --disabled true
146
-
```
147
-
148
-
### Delete a log alert rule
149
-
150
-
```azurecli
151
-
az monitor scheduled-query delete -g {ResourceGroup} -n {AlertRuleName}
152
-
```
93
+
1. Use these options of the `az monitor scheduled-query alert` CLI command in this table:
94
+
95
+
96
+
|What you want to do|CLI command |
97
+
|---------|---------|
98
+
|View all the log alert rules in a resource group|`az monitor scheduled-query list -g {ResourceGroup}`|
99
+
|See the details of a log alert rule|`az monitor scheduled-query show -g {ResourceGroup} -n {AlertRuleName}`|
100
+
||`az monitor scheduled-query show --ids {RuleResourceId}`|
|Learn more about the command|`az monitor scheduled-query --help`|
153
104
154
105
### Manage log alert rules using the Azure Resource Manager CLI with [templates](./alerts-log-create-templates.md)
155
106
@@ -164,6 +115,10 @@ az deployment group create \
164
115
165
116
A 201 response is returned on successful creation. 200 is returned on successful updates.
166
117
118
+
## Manage log alert rules with PowerShell
119
+
120
+
Log alert rules have this dedicated PowerShell cmdlet:
121
+
-[New-AzScheduledQueryRule](/powershell/module/az.monitor/new-azscheduledqueryrule): Creates a new log alert rule or updates an existing log alert rule.
167
122
## Manage activity log alert rules using PowerShell
168
123
169
124
Activity log alerts have these dedicated PowerShell cmdlets:
@@ -176,6 +177,7 @@ If you were setting `dateFilterColumn`, `startTime`, `endTime`, and `userScopeFi
176
177
177
178
For a full list of sections and properties available for defining activities, see the [Pipelines](concepts-pipelines-activities.md) article. This section provides a list of properties supported by Microsoft 365 (Office 365) source.
178
179
180
+
179
181
### Microsoft 365 (Office 365) as source
180
182
181
183
To copy data from Microsoft 365 (Office 365), the following properties are supported in the copy activity **source** section:
@@ -360,5 +362,9 @@ To create a mapping data flow using the Microsoft 365 connector as a source, com
360
362
361
363
6. On the tab **Data preview** click on the **Refresh** button to fetch a sample dataset for validation.
362
364
365
+
## Lookup activity properties
366
+
367
+
To learn details about the properties, check [Lookup activity](control-flow-lookup-activity.md).
368
+
363
369
## Next steps
364
370
For a list of data stores supported as sources and sinks by the copy activity, see [supported data stores](copy-activity-overview.md#supported-data-stores-and-formats).
Copy file name to clipboardExpand all lines: articles/data-factory/connector-troubleshoot-synapse-sql.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Troubleshoot the Azure Synapse Analytics, Azure SQL Database, and SQL Server connectors
2
+
title: Troubleshoot the Azure Synapse Analytics, Azure SQL Database, SQL Server, Azure SQL Managed Instance, and Amazon RDS for SQL Server connectors
3
3
titleSuffix: Azure Data Factory & Azure Synapse
4
-
description: Learn how to troubleshoot issues with the Azure Synapse Analytics, Azure SQL Database, and SQL Server connectors in Azure Data Factory and Azure Synapse Analytics.
4
+
description: Learn how to troubleshoot issues with the Azure Synapse Analytics, Azure SQL Database, SQL Server connectors, Azure SQL Managed Instance, and Amazon RDS for SQL Server in Azure Data Factory and Azure Synapse Analytics.
5
5
author: jianleishen
6
6
ms.author: jianleishen
7
7
ms.reviewer: joanpo, wiassaf
8
-
ms.date: 09/20/2022
8
+
ms.date: 10/18/2022
9
9
ms.service: data-factory
10
10
ms.subservice: data-movement
11
11
ms.topic: troubleshooting
@@ -14,11 +14,11 @@ ms.custom:
14
14
- synapse
15
15
---
16
16
17
-
# Troubleshoot the Azure Synapse Analytics, Azure SQL Database, and SQL Server connectors in Azure Data Factory and Azure Synapse
17
+
# Troubleshoot the Azure Synapse Analytics, Azure SQL Database, SQL Server, Azure SQL Managed Instance, and Amazon RDS for SQL Server connectors in Azure Data Factory and Azure Synapse
This article provides suggestions to troubleshoot common problems with the Azure Synapse Analytics, Azure SQL Database, and SQL Server connectors in Azure Data Factory and Azure Synapse.
21
+
This article provides suggestions to troubleshoot common problems with the Azure Synapse Analytics, Azure SQL Database, SQL Server, Azure SQL Managed Instance, and Amazon RDS for SQL Server connectors in Azure Data Factory and Azure Synapse.
22
22
23
23
## Error code: SqlFailedToConnect
24
24
@@ -33,7 +33,8 @@ This article provides suggestions to troubleshoot common problems with the Azure
33
33
| If the error message contains the string "SqlException", SQL Database the error indicates that some specific operation failed. | For more information, search by SQL error code in [Database engine errors](/sql/relational-databases/errors-events/database-engine-events-and-errors). For further help, contact Azure SQL support. |
34
34
| If this is a transient issue (for example, an instable network connection), add retry in the activity policy to mitigate. | For more information, see [Pipelines and activities](./concepts-pipelines-activities.md#activity-policy). |
35
35
| If the error message contains the string "Client with IP address '...' is not allowed to access the server", and you're trying to connect to Azure SQL Database, the error is usually caused by an Azure SQL Database firewall issue. | In the Azure SQL Server firewall configuration, enable the **Allow Azure services and resources to access this server** option. For more information, see [Azure SQL Database and Azure Synapse IP firewall rules](/azure/azure-sql/database/firewall-configure). |
36
-
36
+
|If the error message contains `Login failed for user '<token-identified principal>'`, this error is usually caused by not granting enough permission to your service principal or system-assigned managed identity or user-assigned managed identity (depends on which authentication type you choose) in your database. |Grant enough permission to your service principal or system-assigned managed identity or user-assigned managed identity in your database. <br/><br/> **For Azure SQL Database**:<br/> - If you use service principal authentication, follow [Service principal authentication](connector-azure-sql-database.md#service-principal-authentication).<br/> - If you use system-assigned managed identity authentication, follow [System-assigned managed identity authentication](connector-azure-sql-database.md#managed-identity).<br/> - If you use user-assigned managed identity authentication, follow [User-assigned managed identity authentication](connector-azure-sql-database.md#user-assigned-managed-identity-authentication). <br/> <br/>**For Azure Synapse Analytics**:<br/> - If you use service principal authentication, follow [Service principal authentication](connector-azure-sql-data-warehouse.md#service-principal-authentication).<br/> - If you use system-assigned managed identity authentication, follow [System-assigned managed identities for Azure resources authentication](connector-azure-sql-data-warehouse.md#managed-identity).<br/> - If you use user-assigned managed identity authentication, follow [User-assigned managed identity authentication](connector-azure-sql-data-warehouse.md#user-assigned-managed-identity-authentication).<br/> <br/>**For Azure SQL Managed Instance**: <br/> - If you use service principal authentication, follow [Service principal authentication](connector-azure-sql-managed-instance.md#service-principal-authentication).<br/> - If you use system-assigned managed identity authentication, follow [System-assigned managed identity authentication](connector-azure-sql-managed-instance.md#managed-identity).<br/> - If you use user-assigned managed identity authentication, follow [User-assigned managed identity authentication](connector-azure-sql-managed-instance.md#user-assigned-managed-identity-authentication).|
37
+
37
38
## Error code: SqlOperationFailed
38
39
39
40
-**Message**: `A database operation failed. Please search error to get more details.`
0 commit comments