Skip to content

Commit 1d29301

Browse files
committed
Merge branch 'enewman/updatesForNicole' of https://github.com/EMaher/azure-docs-pr into enewman/updatesForNicole
2 parents 801aac3 + f9228fe commit 1d29301

File tree

126 files changed

+2062
-298
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+2062
-298
lines changed

articles/active-directory/app-provisioning/check-status-user-account-provisioning.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 05/11/2021
11+
ms.date: 05/30/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -21,10 +21,15 @@ This article describes how to check the status of provisioning jobs after they h
2121

2222
## Overview
2323

24-
Provisioning connectors are set up and configured using the [Azure portal](https://portal.azure.com), by following the [provided documentation](../saas-apps/tutorial-list.md) for the supported application. Once configured and running, provisioning jobs can be reported on using one of two methods:
24+
Provisioning connectors are set up and configured using the [Azure portal](https://portal.azure.com), by following the [provided documentation](../saas-apps/tutorial-list.md) for the supported application. Once configured and running, provisioning jobs can be reported on using the following methods:
2525

26-
* **Azure portal** - This article primarily describes retrieving report information from the [Azure portal](https://portal.azure.com), which provides both a provisioning summary report as well as detailed provisioning audit logs for a given application.
27-
* **Audit API** - Azure Active Directory also provides an Audit API that enables programmatic retrieval of the detailed provisioning audit logs. See [Azure Active Directory audit API reference](/graph/api/resources/directoryaudit) for documentation specific to using this API. While this article does not specifically cover how to use the API, it does detail the types of provisioning events that are recorded in the audit log.
26+
- The [Azure portal](https://portal.azure.com)
27+
28+
- Streaming the provisioning logs into [Azure Monitor](../app-provisioning/application-provisioning-log-analytics.md). This method allows for extended data retention and building custom dashboards, alerts, and queries.
29+
30+
- Querying the [Microsoft Graph API](/graph/api/resources/provisioningobjectsummary) for the provisioning logs.
31+
32+
- Downloading the provisioning logs as a CSV or JSON file.
2833

2934
### Definitions
3035

@@ -35,7 +40,7 @@ This article uses the following terms, defined below:
3540

3641
## Getting provisioning reports from the Azure portal
3742

38-
To get provisioning report information for a given application, start by launching the [Azure portal](https://portal.azure.com) and **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section. You can also browse to the Enterprise Application for which provisioning is configured. For example, if you are provisioning users to LinkedIn Elevate, the navigation path to the application details is:
43+
To get provisioning report information for a given application, start by launching the [Azure portal](https://portal.azure.com) and **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs** in the **Activity** section. You can also browse to the Enterprise Application for which provisioning is configured. For example, if you are provisioning users to LinkedIn Elevate, the navigation path to the application details is:
3944

4045
**Azure Active Directory > Enterprise Applications > All applications > LinkedIn Elevate**
4146

@@ -54,10 +59,10 @@ The **Current Status** should be the first place admins look to check on the ope
5459

5560
 ![Summary report](./media/check-status-user-account-provisioning/provisioning-progress-bar-section.png)
5661

57-
## Provisioning logs (preview)
62+
## Provisioning logs
63+
64+
All activities performed by the provisioning service are recorded in the Azure AD [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context). You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs ** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
5865

59-
All activities performed by the provisioning service are recorded in the Azure AD [provisioning logs](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context). You can access the provisioning logs in the Azure portal by selecting **Azure Active Directory** > **Enterprise Apps** > **Provisioning logs (preview)** in the **Activity** section. You can search the provisioning data based on the name of the user or the identifier in either the source system or the target system. For details, see [Provisioning logs (preview)](../reports-monitoring/concept-provisioning-logs.md?context=azure/active-directory/manage-apps/context/manage-apps-context).
60-
Logged activity event types include:
6166

6267
## Troubleshooting
6368

@@ -68,4 +73,4 @@ For scenario-based guidance on how to troubleshoot automatic user provisioning,
6873
## Additional Resources
6974

7075
* [Managing user account provisioning for Enterprise Apps](configure-automatic-user-provisioning-portal.md)
71-
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)
76+
* [What is application access and single sign-on with Azure Active Directory?](../manage-apps/what-is-single-sign-on.md)

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -237,7 +237,7 @@ It's common for a security review to be required as part of a deployment. If you
237237

238238
If the automatic user provisioning implementation fails to work as desired in the production environment, the following rollback steps below can assist you in reverting to a previous known good state:
239239

240-
1. Review the [provisioning summary report](../app-provisioning/check-status-user-account-provisioning.md) and [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md#provisioning-logs-preview) to determine what incorrect operations occurred on the affected users and/or groups.
240+
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md) to determine what incorrect operations occurred on the affected users and/or groups.
241241

242242
1. Use provisioning audit logs to determine the last known good state of the users and/or groups affected. Also review the source systems (Azure AD or AD).
243243

@@ -324,4 +324,4 @@ Refer to the following links to troubleshoot any issues that may turn up during
324324

325325
* [Export or import your provisioning configuration by using Microsoft Graph API](../app-provisioning/export-import-provisioning-configuration.md)
326326

327-
* [Writing expressions for attribute mappings in Azure Active directory](../app-provisioning/functions-for-customizing-application-data.md)
327+
* [Writing expressions for attribute mappings in Azure Active directory](../app-provisioning/functions-for-customizing-application-data.md)

articles/active-directory/app-provisioning/plan-cloud-hr-provision.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,7 @@ It's common for a security review to be required as part of the deployment of a
463463

464464
The cloud HR user provisioning implementation might fail to work as desired in the production environment. If so, the following rollback steps can assist you in reverting to a previous known good state.
465465

466-
1. Review the [provisioning summary report](../app-provisioning/check-status-user-account-provisioning.md#getting-provisioning-reports-from-the-azure-portal) and [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md#provisioning-logs-preview) to determine what incorrect operations were performed on the affected users or groups. For more information on the provisioning summary report and logs, see [Manage cloud HR app user provisioning](#manage-your-configuration).
466+
1. Review the [provisioning logs](../app-provisioning/check-status-user-account-provisioning.md#provisioning-logs) to determine what incorrect operations were performed on the affected users or groups. For more information on the provisioning summary report and logs, see [Manage cloud HR app user provisioning](#manage-your-configuration).
467467
2. The last known good state of the users or groups affected can be determined through the provisioning audit logs or by reviewing the target systems (Azure AD or Active Directory).
468468
3. Work with the app owner to update the users or groups affected directly in the app by using the last known good state values.
469469

articles/azure-cache-for-redis/cache-how-to-premium-vnet.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,9 +48,7 @@ Virtual network support is configured on the **New Azure Cache for Redis** pane
4848
1. On the **Networking** tab, select **Virtual Networks** as your connectivity method. To use a new virtual network, create it first by following the steps in [Create a virtual network using the Azure portal](../virtual-network/manage-virtual-network.md#create-a-virtual-network) or [Create a virtual network (classic) by using the Azure portal](/previous-versions/azure/virtual-network/virtual-networks-create-vnet-classic-pportal). Then return to the **New Azure Cache for Redis** pane to create and configure your Premium-tier cache.
4949

5050
> [!IMPORTANT]
51-
> When you deploy Azure Cache for Redis to a Resource Manager virtual network, the cache must be in a dedicated subnet that contains no other resources except for Azure Cache for Redis instances. If you attempt to deploy an Azure Cache for Redis instance to a Resource Manager virtual network subnet that contains other resources, or has a NAT Gateway assigned, the deployment fails.
52-
>
53-
>
51+
> When you deploy Azure Cache for Redis to a Resource Manager virtual network, the cache must be in a dedicated subnet that contains no other resources except for Azure Cache for Redis instances. If you attempt to deploy an Azure Cache for Redis instance to a Resource Manager virtual network subnet that contains other resources, or has a NAT Gateway assigned, the deployment fails. The failure is because Azure Cache for Redis uses a basic load balancer that is not compatible with a NAT Gateway.
5452
5553
| Setting | Suggested value | Description |
5654
| ------------ | ------- | -------------------------------------------------- |
@@ -186,7 +184,7 @@ After the port requirements are configured as described in the previous section,
186184

187185
- [Reboot](cache-administration.md#reboot) all of the cache nodes. The cache won't be able to restart successfully if all of the required cache dependencies can't be reached---as documented in [Inbound port requirements](cache-how-to-premium-vnet.md#inbound-port-requirements) and [Outbound port requirements](cache-how-to-premium-vnet.md#outbound-port-requirements).
188186
- After the cache nodes have restarted, as reported by the cache status in the Azure portal, you can do the following tests:
189-
- Ping the cache endpoint by using port 6380 from a machine that's within the same virtual network as the cache, using [tcping](https://www.elifulkerson.com/projects/tcping.php). For example:
187+
- Ping the cache endpoint by using port 6380 from a machine that's within the same virtual network as the cache, using [`tcping`](https://www.elifulkerson.com/projects/tcping.php). For example:
190188

191189
`tcping.exe contosocache.redis.cache.windows.net 6380`
192190

articles/azure-monitor/agents/agents-overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,8 @@ Since the Dependency agent works at the kernel level, support is also dependent
221221

222222
| Distribution | OS version | Kernel version |
223223
|:---|:---|:---|
224-
| Red Hat Linux 8 | 8.4 | 4.18.0-305.\*el8.x86_64, 4.18.0-305.\*el8_4.x86_64 |
224+
| Red Hat Linux 8 | 8.5 | 4.18.0-348.\*el8_5.x86_644.18.0-348.\*el8.x86_64 |
225+
| | 8.4 | 4.18.0-305.\*el8.x86_64, 4.18.0-305.\*el8_4.x86_64 |
225226
| | 8.3 | 4.18.0-240.\*el8_3.x86_64 |
226227
| | 8.2 | 4.18.0-193.\*el8_2.x86_64 |
227228
| | 8.1 | 4.18.0-147.\*el8_1.x86_64 |
@@ -234,7 +235,8 @@ Since the Dependency agent works at the kernel level, support is also dependent
234235
| | 7.4 | 3.10.0-693 |
235236
| Red Hat Linux 6 | 6.10 | 2.6.32-754 |
236237
| | 6.9 | 2.6.32-696 |
237-
| CentOS Linux 8 | 8.4 | 4.18.0-305.\*el8.x86_64, 4.18.0-305.\*el8_4.x86_64 |
238+
| CentOS Linux 8 | 8.5 | 4.18.0-348.\*el8_5.x86_644.18.0-348.\*el8.x86_64 |
239+
| | 8.4 | 4.18.0-305.\*el8.x86_64, 4.18.0-305.\*el8_4.x86_64 |
238240
| | 8.3 | 4.18.0-240.\*el8_3.x86_64 |
239241
| | 8.2 | 4.18.0-193.\*el8_2.x86_64 |
240242
| | 8.1 | 4.18.0-147.\*el8_1.x86_64 |

articles/azure-monitor/alerts/alerts-resource-move.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,9 +94,9 @@ Navigate to Alerts > Alert processing rules (preview) > filter by the containing
9494

9595
### Change scope of a rule using PowerShell
9696

97-
1. Get the existing rule ([metric alerts](/powershell/module/az.monitor/get-azmetricalertrulev2), [activity log alerts](/powershell/module/az.monitor/get-azactivitylogalert), [alert processing rules](/powershell/module/az.alertsmanagement/get-azactionrule)).
97+
1. Get the existing rule ([metric alerts](/powershell/module/az.monitor/get-azmetricalertrulev2), [activity log alerts](/powershell/module/az.monitor/get-azactivitylogalert), alert [processing rules](/powershell/module/az.alertsmanagement/get-azalertprocessingrule)).
9898
2. Modify the scope. If needed, split into two rules (relevant for some cases of metric alerts, as noted above).
99-
3. Redeploy the rule ([metric alerts](/powershell/module/az.monitor/add-azmetricalertrulev2), [activity log alerts](/powershell/module/az.monitor/enable-azactivitylogalert), [alert processing rules](/powershell/module/az.alertsmanagement/set-azactionrule)).
99+
3. Redeploy the rule ([metric alerts](/powershell/module/az.monitor/add-azmetricalertrulev2), [activity log alerts](/powershell/module/az.monitor/enable-azactivitylogalert), [alert processing rules](/powershell/module/az.alertsmanagement/set-azalertprocessingrule)).
100100

101101
### Change the scope of a rule using Azure CLI
102102

23 KB
Loading
18.3 KB
Loading
22.1 KB
Loading

0 commit comments

Comments
 (0)