Skip to content

Commit 3f7f3e9

Browse files
committed
fix toc
1 parent 191cc4f commit 3f7f3e9

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

articles/azure-monitor/platform/private-link-security.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ In the Azure portal in your Azure Monitor Application Insights Component resourc
142142

143143
**---------- TODO ------------- get screenshot----**
144144

145-
![AI Network Isolation](./media/private-link-security/6-ampls-ai-network-isolation.png)
145+
<!-- ![AI Network Isolation](./media/private-link-security/6-ampls-ai-network-isolation.png) -->
146146

147147
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connecting-azure-monitor-resources).
148148

@@ -171,11 +171,11 @@ For more information on bringing your own storage account, see [Customer-owned s
171171

172172
### Log Analytics Windows Agent
173173

174-
Use Agent version >= 18.20.18038.0
174+
Your must use the Log Analytics agent version 18.20.18038.0 or later.
175175

176176
### Log Analytics Linux Agent
177177

178-
Use Agent version >= 1.12.25. If you cannot, run the following commands on your VM.
178+
Your must use agent version 1.12.25 or later. If you cannot, run the following commands on your VM.
179179

180180
```cmd
181181
$ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -X
@@ -184,7 +184,7 @@ $ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -w <workspace id> -s <workspace k
184184

185185
### Azure Resource Manager queries
186186

187-
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
187+
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
188188

189189
### AI SDK Downloads from CDN
190190

@@ -193,4 +193,5 @@ An example is provided on [GitHub](https://github.com/microsoft/ApplicationInsig
193193

194194
### LA Solution download
195195

196+
-------------TODO -------------
196197
Please put xxx in your allow list. FQD?

articles/azure-monitor/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@
101101
- name: Private Link networking
102102
href: platform/private-link-security.md
103103
- name: Private storage
104-
href: platform/private-stroage.md
104+
href: platform/private-storage.md
105105
- name: Personal log data handling
106106
href: platform/personal-data-mgmt.md
107107
- name: Application data collection, retention, and storage

0 commit comments

Comments
 (0)