Skip to content

Commit 2e72661

Browse files
authored
Merge pull request #133826 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 2c586a0 + c680d3b commit 2e72661

File tree

240 files changed

+1925
-777
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

240 files changed

+1925
-777
lines changed

.openpublishing.redirection.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/healthcare-apis/bring-your-own-key.md",
5+
"redirect_url": "/azure/healthcare-apis/customer-managed-key",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/virtual-machines/linux/sa-upload-vhd.md",
510
"redirect_url": "/previous-versions/azure/virtual-machines/linux/sa-upload-vhd",
@@ -38353,12 +38358,17 @@
3835338358
},
3835438359
{
3835538360
"source_path": "articles/active-directory/application-provisioning-config-problem-storage-limit.md",
38356-
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit",
38361+
"redirect_url": "/azure/active-directory/app-provisioning/user-provisioning",
3835738362
"redirect_document_id": true
3835838363
},
3835938364
{
3836038365
"source_path": "articles/active-directory/manage-apps/application-provisioning-config-problem-storage-limit.md",
38361-
"redirect_url": "/azure/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit",
38366+
"redirect_url": "/azure/active-directory/app-provisioning/user-provisioning",
38367+
"redirect_document_id": false
38368+
},
38369+
{
38370+
"source_path": "articles/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit.md",
38371+
"redirect_url": "/azure/active-directory/app-provisioning/user-provisioning",
3836238372
"redirect_document_id": false
3836338373
},
3836438374
{

articles/active-directory-b2c/conditional-access-technical-profile.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 09/01/2020
12+
ms.date: 10/14/2020
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -517,3 +517,7 @@ The following is an example of a relying party file that references this UserJou
517517
</RelyingParty>
518518
</TrustFrameworkPolicy>
519519
```
520+
521+
## Next steps
522+
523+
- You can find an example of a conditional access policy on [GitHub](https://github.com/azure-ad-b2c/samples/tree/master/policies/conditional-access).

articles/active-directory/app-provisioning/application-provisioning-config-problem-storage-limit.md

Lines changed: 0 additions & 39 deletions
This file was deleted.

articles/active-directory/app-provisioning/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,8 +58,6 @@
5858
href: application-provisioning-config-problem.md
5959
- name: Quarantine status
6060
href: application-provisioning-quarantine-status.md
61-
- name: Authorization issue (unable to save admin credentials)
62-
href: application-provisioning-config-problem-storage-limit.md
6361
- name: Users aren't provisioned
6462
href: application-provisioning-config-problem-no-users-provisioned.md
6563
- name: Missing source attribute

articles/active-directory/develop/quickstart-v2-netcore-daemon.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -70,15 +70,13 @@ This quickstart requires [.NET Core 3.1](https://www.microsoft.com/net/download/
7070

7171
> [!div renderon="docs"]
7272
> [Download the Visual Studio project](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/archive/master.zip)
73-
74-
> [!div renderon="docs"]
75-
> > [!NOTE]
76-
> > You can run the provided project in either Visual Studio or Visual Studio for Mac
73+
>
74+
> You can run the provided project in either Visual Studio or Visual Studio for Mac.
7775
7876

7977
> [!div class="sxs-lookup" renderon="portal"]
8078
> Run the project using Visual Studio 2019.
81-
> [!div renderon="portal" id="autoupdate" class="nextstepaction"]
79+
> [!div class="sxs-lookup" renderon="portal" id="autoupdate" class="nextstepaction"]
8280
> [Download the code sample](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/archive/master.zip)
8381
8482
> [!div class="sxs-lookup" renderon="portal"]

articles/active-directory/manage-apps/add-application-portal-configure.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,10 +36,7 @@ To edit the application properties:
3636

3737
1. In the Azure AD portal, select **Enterprise applications**. Then find and select the application you want to configure.
3838
2. In the **Manage** section, select **Properties** to open the **Properties** pane for editing.
39-
40-
![Screenshot of the Properties screen that shows editable app properties.](media/add-application-portal/edit-properties.png)
41-
42-
3. Take a moment to understand the options available to configure:
39+
3. Take a moment to understand the options available. The options available will depend on how the app is integrated with Azure AD. For example, an app that uses SAML-based single sign-on will have fields such as *User access URL* whereas an app that uses OIDC-based single sign-on will not. Also note that apps added through **Azure Active Directory > App registrations** are by default OIDC-based apps. Whereas apps added through **Azure Active Directory > Enterprise applications** might use any of a number of single sign-on standards. All apps will have fields for configuring when an app appears and can be used. These fields are:
4340
- **Enabled for users to sign in?** determines whether users assigned to the application can sign in.
4441
- **User assignment required?** determines whether users who aren't assigned to the application can sign in.
4542
- **Visible to users?** determines whether users assigned to an app can see it in [My Apps](https://myapps.microsoft.com) and Microsoft 365 app launcher. (See the waffle menu in the upper-left corner of a Microsoft 365 website.)

articles/app-service/web-sites-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You can increase or remove quotas from your app by upgrading your App Service pl
5757
## Understand metrics
5858

5959
> [!NOTE]
60-
> **File System Usage** is a new metric being rolled out globally, no data is expected unless you've been granted access for private preview.
60+
> **File System Usage** is a new metric being rolled out globally, no data is expected unless your app is hosted in an App Service Environment.
6161
>
6262
6363
> [!IMPORTANT]
Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: Query data in Azure Monitor using Azure Data Explorer (preview)
3+
description: Use Azure Data Explorer to perform cross product queries between Azure Data Explorer, Log Analytics workspaces and classic Application Insights applications in Azure Monitor.
4+
author: orens
5+
ms.author: bwren
6+
ms.reviewer: bwren
7+
ms.subservice: logs
8+
ms.topic: conceptual
9+
ms.date: 10/13/2020
10+
11+
---
12+
13+
# Query data in Azure Monitor using Azure Data Explorer (preview)
14+
The Azure Data Explorer proxy cluster enables you to perform cross product queries between Azure Data Explorer, Log Analytics workspaces and classic Application Insights applications in Azure Monitor. You can map Log Analytics workspaces in Azure Monitor or classic Application Insights apps as proxy clusters. You can then query the proxy cluster using Azure Data Explorer tools and refer to it in a cross cluster query. The article shows how to connect to a proxy cluster, add a proxy cluster to Azure Data Explorer Web UI, and run queries against your Log Analytics workspaces or classic Application Insights apps from Azure Data Explorer.
15+
16+
The following diagram shows the Azure Data Explorer proxy flow:
17+
18+
:::image type="content" source="media/azure-data-explorer-monitor-proxy/azure-data-explorer-monitor-proxy-flow.png" alt-text="Azure data explorer proxy flow.":::
19+
20+
21+
> [!NOTE]
22+
> The Azure Data Explorer proxy is in public preview. [Connect to the proxy](#connect-to-the-proxy) to enable the proxy feature for your clusters.
23+
24+
## Connect to the proxy
25+
To connect your Log Analytics workspace or classic Application Insights app, open the[Azure Data Explorer Web UI](https://dataexplorer.azure.com/clusters). Verify your Azure Data Explorer native cluster (such as *help* cluster) appears on the left menu before you connect to your Log Analytics or Application Insights cluster.
26+
27+
:::image type="content" source="media/azure-data-explorer-monitor-proxy/azure-data-explorer-web-ui-help-cluster.png" alt-text="Azure Data Explorer native cluster.":::
28+
29+
Click **Add Cluster** and then add the URL of the Log Analytics or Application Insights cluster in one of the following formats.
30+
31+
* For Log Analytics: `https://ade.loganalytics.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>`
32+
* For Application Insights: `https://ade.applicationinsights.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.insights/components/<ai-app-name>`
33+
34+
Click **Add** to make the connection.
35+
36+
:::image type="content" source="media/azure-data-explorer-monitor-proxy/azure-monitor-proxy-add-cluster.png" alt-text="Add cluster.":::
37+
38+
> [!NOTE]
39+
> If you add a connection to more than one proxy cluster, give each a different name. Otherwise they'll all have the same name in the left pane.
40+
41+
After the connection is established, your Log Analytics or Application Insights cluster will appear in the left pane with your native Azure Data Explorer cluster.
42+
43+
:::image type="content" source="media/azure-data-explorer-monitor-proxy/azure-monitor-azure-data-explorer-clusters.png" alt-text="Log Analytics and Azure Data Explorer clusters.":::
44+
45+
> [!NOTE]
46+
> The number of Azure Monitor workspaces that can be mapped is limited to 100.
47+
48+
## Create queries using Azure Monitor data
49+
50+
You can run the queries using client tools that support Kusto queries, such as: Kusto Explorer, Azure Data Explorer Web UI, Jupyter Kqlmagic, Flow, PowerQuery, PowerShell, Jarvis, Lens, and REST API.
51+
52+
> [!NOTE]
53+
> The Azure Data Explorer proxy feature is used for data retrieval only. For more information, see [Function supportability](#function-supportability).
54+
55+
> [!TIP]
56+
> * Database name should have the same name as the resource specified in the proxy cluster. Names are case sensitive.
57+
> * In cross cluster queries, make sure that the naming of Application Insights apps and Log Analytics workspaces is correct.
58+
> * If names contain special characters, they're replaced by URL encoding in the proxy cluster name.
59+
> * If names include characters that don't meet [KQL identifier name rules](https://docs.microsoft.com/azure/data-explorer/kusto/query/schema-entities/entity-names), they are replaced by the dash **-** character.
60+
61+
### Direct query from your Log Analytics or Application Insights proxy cluster
62+
63+
Run queries on your Log Analytics or Application Insights cluster. Verify that your cluster is selected in the left pane.
64+
65+
```kusto
66+
Perf | take 10 // Demonstrate query through the proxy on the Log Analaytics workspace
67+
```
68+
69+
:::image type="content" source="media/azure-data-explorer-monitor-proxy/azure-monitor-proxy-query-la.png" alt-text="Query Log Analytics workspace.":::
70+
71+
### Cross query of your Log Analytics or Application Insights proxy cluster and the Azure Data Explorer native cluster
72+
73+
When you run cross cluster queries from the proxy, verify your Azure Data Explorer native cluster is selected in the left pane. The following examples demonstrate combining Azure Data Explorer cluster tables using the [union](/azure/data-explorer/kusto/query/unionoperator) operator with a Log Analytics workspace.
74+
75+
```kusto
76+
union StormEvents, cluster('https://ade.loganalytics.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>').database('<workspace-name>').Perf
77+
| take 10
78+
```
79+
80+
```kusto
81+
let CL1 = 'https://ade.loganalytics.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>';
82+
union <Azure Data Explorer table>, cluster(CL1).database(<workspace-name>).<table name>
83+
```
84+
Using the [`join` operator](/azure/data-explorer/kusto/query/joinoperator?pivots=azuredataexplorer), instead of union, may require a [hint](/azure/data-explorer/kusto/query/joinoperator?pivots=azuredataexplorer#join-hints) to run it on an Azure Data Explorer native cluster (and not on the proxy).
85+
86+
### Join data from an Azure Data Explorer cluster in one tenant with an Azure Monitor resource in another
87+
88+
Cross-tenant queries aren't supported by Azure Data Explorer proxy. You are signed in to a single tenant for running the query spanning both resources.
89+
90+
If the Azure Data Explorer resource is in Tenant 'A' and Log Analytics workspace is in Tenant 'B' use one of the following two methods:
91+
92+
- Azure Data Explorer allows you to add roles for principals in different tenants. Add your user ID in Tenant 'B' as an authorized user on the Azure Data Explorer cluster. Validate the *['TrustedExternalTenant'](https://docs.microsoft.com/powershell/module/az.kusto/update-azkustocluster)* property on the Azure Data Explorer cluster contains Tenant 'B'. Run the cross-query fully in Tenant 'B'.
93+
94+
- Use [Lighthouse](/azure/lighthouse/) to project the Azure Monitor resource into Tenant 'A'.
95+
96+
### Connect to Azure Data Explorer clusters from different tenants
97+
98+
Kusto Explorer automatically signs you into the tenant to which the user account originally belongs. To access resources in other tenants with the same user account, the `tenantId` has to be explicitly specified in the connection string:
99+
`Data Source=https://ade.applicationinsights.io/subscriptions/SubscriptionId/resourcegroups/ResourceGroupName;Initial Catalog=NetDefaultDB;AAD Federated Security=True;Authority ID=`**TenantId**
100+
101+
## Function supportability
102+
103+
The Azure Data Explorer proxy cluster supports functions for both Log Analytics and Application Insights. This capability enables cross-cluster queries to reference an Azure Monitor tabular function directly.
104+
105+
The following commands are supported by the proxy:
106+
107+
* `.show functions`
108+
* `.show function {FunctionName}`
109+
* `.show database {DatabaseName} schema as json`
110+
111+
The following image depicts an example of querying a tabular function from the Azure Data Explorer Web UI. To use the function, run the name in the Query window.
112+
113+
:::image type="content" source="media/azure-data-explorer-monitor-proxy/azure-monitor-proxy-function-query.png" alt-text="Query a tabular function from Azure Data Explorer Web UI.":::
114+
115+
> [!NOTE]
116+
> Azure Monitor only supports tabular functions, which don't support parameters.
117+
118+
## Additional syntax examples
119+
120+
The following syntax options are available when calling the Log Analytics or Application Insights clusters:
121+
122+
|Syntax Description |Application Insights |Log Analytics |
123+
|----------------|---------|---------|
124+
| Database within a cluster that contains only the defined resource in this subscription (**recommended for cross cluster queries**) | cluster(`https://ade.applicationinsights.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.insights/components/<ai-app-name>').database('<ai-app-name>`) | cluster(`https://ade.loganalytics.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>').database('<workspace-name>`) |
125+
| Cluster that contains all apps/workspaces in this subscription | cluster(`https://ade.applicationinsights.io/subscriptions/<subscription-id>`) | cluster(`https://ade.loganalytics.io/subscriptions/<subscription-id>`) |
126+
|Cluster that contains all apps/workspaces in the subscription and are members of this resource group | cluster(`https://ade.applicationinsights.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>`) | cluster(`https://ade.loganalytics.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>`) |
127+
|Cluster that contains only the defined resource in this subscription | cluster(`https://ade.applicationinsights.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.insights/components/<ai-app-name>`) | cluster(`https://ade.loganalytics.io/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>`) |
128+
129+
## Next steps
130+
131+
- Read more about the [data structure of Log Analytics workspaces and Application Insights](data-platform-logs.md).
132+
- Learn to [write queries in Azure Data Explorer](https://docs.microsoft.com/azure/data-explorer/write-queries).

0 commit comments

Comments
 (0)