Skip to content

Commit 11e3e47

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into normesta-azcopy
2 parents b000766 + cdc81e5 commit 11e3e47

File tree

77 files changed

+618
-816
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+618
-816
lines changed

.openpublishing.redirection.json

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -355,7 +355,7 @@
355355
"redirect_url": "/azure/machine-learning/data-science-virtual-machine/reference-deprecation",
356356
"redirect_document_id": true
357357
},
358-
358+
359359
{
360360
"source_path": "articles/machine-learning/service/how-to-understand-accuracy-metrics.md",
361361
"redirect_url": "/azure/machine-learning/service/how-to-understand-automated-ml",
@@ -50683,6 +50683,16 @@
5068350683
"source_path": "articles/chef/index.yml",
5068450684
"redirect_url": "/azure/developer/chef/",
5068550685
"redirect_document_id": false
50686+
},
50687+
{
50688+
"source_path": "articles/security/fundamentals/database-security-overview.md",
50689+
"redirect_url": "/azure/sql-database/sql-database-security-overview",
50690+
"redirect_document_id": false
50691+
},
50692+
{
50693+
"source_path": "articles/security/fundamentals/database-best-practices.md",
50694+
"redirect_url": "/azure/sql-database/sql-database-security-best-practice",
50695+
"redirect_document_id": false
5068650696
}
5068750697
]
5068850698
}

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,6 @@ app = ConfidentialClientApplicationBuilder.Create(config.ClientId)
193193
.WithClientSecret(config.ClientSecret)
194194
.WithAuthority(new Uri(config.Authority))
195195
.Build();
196-
);
197196
```
198197

199198
> | Where: ||

articles/active-directory/reports-monitoring/concept-provisioning-logs.md

Lines changed: 32 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -86,23 +86,31 @@ Select an item in the list view to get more detailed information.
8686

8787
## Filter provisioning activities
8888

89-
To narrow down the reported data to a level that works for you, you can filter the provisioning data using the following default fields. Note that the values in the filters are dynamically populated based on your tenant. If, for example, you don't have any create events in your tenant, there won't be a filter option for create.
89+
You can filter your provisioning data. Some filter values are dynamically populated based on your tenant. If, for example, you don't have any create events in your tenant, there won't be a filter option for create.
90+
In the default view, you can select the following filters:
9091

9192
- Identity
92-
- Action
93-
- Source system
94-
- Target system
95-
- Status
9693
- Date
94+
- Status
95+
- Action
9796

9897

99-
![Filter](./media/concept-provisioning-logs/filter.png "Filter")
98+
![Filter](./media/concept-provisioning-logs/default-filter.png "Filter")
10099

101100
The **Identity** filter enables you to specify the name or the identity that you care about. This identity could be a user, group, role, or other object. You can search by the name or ID of the object. The ID varies by scenario. For example, when provisioning an object from Azure AD to SalesForce, the Source ID is the object ID of the user in Azure AD while the TargetID is the ID of the user in Salesforce. When provisioning from Workday to Active Directory, the Source ID is the Workday worker employee ID. Note that the Name of the user may not always be present in the Identity column. There will always be one ID.
102101

103-
The **Source System** filter enables you to specify where the identity is getting provisioned from. For example, when provisioning an object from Azure AD to ServiceNow, the Source system is Azure AD.
104102

105-
The **Target System** filter enables you to specify where the identity is getting provisioned to. For example, when provisioning an object from Azure AD to ServiceNow, the Target System is ServiceNow.
103+
The **Date** filter enables to you to define a timeframe for the returned data.
104+
Possible values are:
105+
106+
- 1 month
107+
- 7 days
108+
- 30 days
109+
- 24 hours
110+
- Custom time interval
111+
112+
When you select a custom time frame, you can configure a start date and an end date.
113+
106114

107115
The **Status** filter enables you to select:
108116

@@ -111,6 +119,8 @@ The **Status** filter enables you to select:
111119
- Failure
112120
- Skipped
113121

122+
123+
114124
The **Action** filter enables you to filter the:
115125

116126
- Create
@@ -119,19 +129,18 @@ The **Action** filter enables you to filter the:
119129
- Disable
120130
- Other
121131

122-
The **Date** filter enables to you to define a timeframe for the returned data.
123-
Possible values are:
132+
In addition, to the filters of the default view, you can also set the following filters:
124133

125-
- 1 month
126-
- 7 days
127-
- 30 days
128-
- 24 hours
129-
- Custom time interval
134+
- Job ID
135+
- Cycle ID
136+
- Change ID
137+
- Source ID
138+
- Target ID
139+
- Application
130140

131-
When you select a custom time frame, you can configure a start date and an end date.
132141

142+
![Pick a field](./media/concept-provisioning-logs/add-filter.png "Pick a field")
133143

134-
In addition to the default fields, when selected, you can also include the following fields in your filter:
135144

136145
- **Job ID** - A unique Job ID is associated with each application that you have enabled provisioning for.
137146

@@ -140,8 +149,13 @@ In addition to the default fields, when selected, you can also include the follo
140149
- **Change ID** - Unique identifier for the provisioning event. You can share this ID to support to look up the provisioning event.
141150

142151

152+
- **Source System** - Enables you to specify where the identity is getting provisioned from. For example, when provisioning an object from Azure AD to ServiceNow, the Source system is Azure AD.
153+
154+
- **Target System** - Enables you to specify where the identity is getting provisioned to. For example, when provisioning an object from Azure AD to ServiceNow, the Target System is ServiceNow.
155+
156+
- **Application** - Enables you to show only records of applications with a display name that contains a specific string.
143157

144-
158+
145159

146160
## Provisioning details
147161

8.7 KB
Loading
12.6 KB
Loading
14 Bytes
Loading

articles/aks/azure-ad-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,12 +93,12 @@ The above command creates a three node AKS cluster, but the user, who created th
9393
Once you've created a group and added yourself (and others) as a member, you can update the cluster with the Azure AD group using the following command
9494

9595
```azurecli-interactive
96-
az aks update -g MyResourceGroup -n MyManagedCluster [--aad-admin-group-object-ids <id1,id2>] [--aad-tenant-id <id>]
96+
az aks update -g MyResourceGroup -n MyManagedCluster [--aad-admin-group-object-ids <id>] [--aad-tenant-id <id>]
9797
```
9898
Alternatively, if you first create a group and add members, you can enable the Azure AD group at create time using the following command,
9999

100100
```azurecli-interactive
101-
az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad [--aad-admin-group-object-ids <id1,id2>] [--aad-tenant-id <id>]
101+
az aks create -g MyResourceGroup -n MyManagedCluster --enable-aad [--aad-admin-group-object-ids <id>] [--aad-tenant-id <id>]
102102
```
103103

104104
A successful creation of an Azure AD v2 cluster has the following section in the response body

articles/app-service/environment/create-ilb-ase.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,9 @@ To create an ILB ASE:
5656

5757
![ASE creation](media/creating_and_using_an_internal_load_balancer_with_app_service_environment/createilbase.png)
5858

59+
> [!NOTE]
60+
> The App Service Environment name must be no more than 37 characters.
61+
5962
6. Select Networking
6063

6164
7. Select or create a Virtual Network. If you create a new VNet here, it will be defined with an address range of 192.168.250.0/23. To create a VNet with a different address range or in a different resource group than the ASE, use the Azure Virtual Network creation portal.
@@ -66,6 +69,7 @@ To create an ILB ASE:
6669

6770
7. Select **Review and Create** then select **Create**.
6871

72+
6973
## Create an app in an ILB ASE ##
7074

7175
You create an app in an ILB ASE in the same way that you create an app in an ASE normally.

articles/azure-databricks/TOC.yml

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1006,7 +1006,41 @@
10061006
items:
10071007
- name: Security overview
10081008
href: /azure/databricks/security/index
1009-
maintainContext: true
1009+
maintainContext: true
1010+
- name: Access control
1011+
items:
1012+
- name: Access control overview
1013+
href: /azure/databricks/security/access-control/index
1014+
maintainContext: true
1015+
- name: Workspace access control
1016+
href: /azure/databricks/security/access-control/workspace-acl
1017+
maintainContext: true
1018+
- name: Cluster access control
1019+
href: /azure/databricks/security/access-control/cluster-acl
1020+
maintainContext: true
1021+
- name: Pool access control
1022+
href: /azure/databricks/security/access-control/pool-acl
1023+
maintainContext: true
1024+
- name: Jobs access control
1025+
href: /azure/databricks/security/access-control/job-acl
1026+
maintainContext: true
1027+
- name: Table access control
1028+
items:
1029+
- name: Table access control overview
1030+
href: /azure/databricks/security/access-control/table-acls/index
1031+
maintainContext: true
1032+
- name: Enable table access control for a cluster
1033+
href: /azure/databricks/security/access-control/table-acls/table-acl
1034+
maintainContext: true
1035+
- name: Data object privileges
1036+
href: /azure/databricks/security/access-control/table-acls/object-privileges
1037+
maintainContext: true
1038+
- name: Secret access control
1039+
href: /azure/databricks/security/access-control/secret-acl
1040+
maintainContext: true
1041+
- name: Authenticate to Azure Data Lake Storage using Azure Active Directory credentials
1042+
href: /azure/databricks/security/credential-passthrough/adls-passthrough
1043+
maintainContext: true
10101044
- name: Secrets
10111045
items:
10121046
- name: Keep data secure with secrets
@@ -1018,21 +1052,18 @@
10181052
- name: Secrets
10191053
href: /azure/databricks/security/secrets/secrets
10201054
maintainContext: true
1021-
- name: Secret access control
1022-
href: /azure/databricks/security/secrets/secret-acl
1023-
maintainContext: true
10241055
- name: Secret redaction
10251056
href: /azure/databricks/security/secrets/redaction
10261057
maintainContext: true
10271058
- name: Secret workflow example
10281059
href: /azure/databricks/security/secrets/example-secret-workflow
10291060
maintainContext: true
10301061
- name: Encrypt traffic between cluster worker nodes
1031-
href: /azure/databricks/security/encrypt-otw
1062+
href: /azure/databricks/security/encryption/encrypt-otw
10321063
- name: Enable customer-managed keys for notebooks
1033-
href: /azure/databricks/security/customer-managed-key-notebook
1064+
href: /azure/databricks/security/keys/customer-managed-key-notebook
10341065
- name: Enable customer-managed keys for DBFS
1035-
href: /azure/databricks/security/customer-managed-keys-dbfs
1066+
href: /azure/databricks/security/keys/customer-managed-keys-dbfs
10361067
- name: Administration
10371068
items:
10381069
- name: Administration overview
@@ -1054,7 +1085,7 @@
10541085
maintainContext: true
10551086
- name: Monitor usage using tags
10561087
href: /azure/databricks/administration-guide/account-settings/usage-detail-tags-azure
1057-
maintainContext: true
1088+
maintainContext: true
10581089
- name: Manage users and groups
10591090
items:
10601091
- name: Users and groups overview
@@ -1080,30 +1111,22 @@
10801111
- name: Access control overview
10811112
href: /azure/databricks/administration-guide/access-control/index
10821113
maintainContext: true
1083-
- name: Cluster access control
1114+
- name: Enable workspace access control
1115+
href: /azure/databricks/administration-guide/access-control/workspace-acl
1116+
maintainContext: true
1117+
- name: Enable cluster access control
10841118
href: /azure/databricks/administration-guide/access-control/cluster-acl
10851119
maintainContext: true
1086-
- name: Pool access control
1120+
- name: Enable pool access control
10871121
href: /azure/databricks/administration-guide/access-control/pool-acl
10881122
maintainContext: true
1089-
- name: Jobs access control
1123+
- name: Enable jobs access control
10901124
href: /azure/databricks/administration-guide/access-control/jobs-acl
10911125
maintainContext: true
1092-
- name: Table access control
1093-
items:
1094-
- name: Table access control overview
1095-
href: /azure/databricks/administration-guide/access-control/table-acls/index
1096-
maintainContext: true
1097-
- name: Enable Table access control
1098-
href: /azure/databricks/administration-guide/access-control/table-acls/table-acl
1099-
maintainContext: true
1100-
- name: Set Privileges on a Data Object
1101-
href: /azure/databricks/administration-guide/access-control/table-acls/object-privileges
1102-
maintainContext: true
1103-
- name: Workspace access control
1104-
href: /azure/databricks/administration-guide/access-control/workspace-acl
1126+
- name: Enable table access control
1127+
href: /azure/databricks/administration-guide/access-control/table-acl
11051128
maintainContext: true
1106-
- name: Enable Token-based authentication
1129+
- name: Enable token-based authentication
11071130
href: /azure/databricks/administration-guide/access-control/tokens
11081131
maintainContext: true
11091132
- name: Conditional access
@@ -1689,6 +1712,9 @@
16891712
- name: Platform release notes
16901713
href: /azure/databricks/release-notes/product/index
16911714
maintainContext: true
1715+
- name: April 2020
1716+
href: /azure/databricks/release-notes/product/2020/april
1717+
maintainContext: true
16921718
- name: March 2020
16931719
href: /azure/databricks/release-notes/product/2020/march
16941720
maintainContext: true

articles/azure-monitor/learn/tutorial-autoscale-performance-schedule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Autoscale Azure resources based on performance data or a schedule
2+
title: Autoscale Azure resources based on data or schedule
33
description: Create an autoscale setting for an app service plan using metric data and a schedule
44
author: anirudhcavale
55
services: azure-monitor

0 commit comments

Comments
 (0)