Skip to content

Commit 41defe9

Browse files
fixes
1 parent ce68972 commit 41defe9

File tree

4 files changed

+3
-10
lines changed

4 files changed

+3
-10
lines changed

articles/azure-monitor/app/resources-roles-access-control.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The user must have a [Microsoft Account][account], or access to their [organizat
4848

4949
1. Assign the Contributor role to the Role Based Access Control.
5050

51-
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
51+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
5252

5353
#### Select a role
5454

articles/azure-monitor/app/snapshot-debugger.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -48,13 +48,6 @@ Access to snapshots is protected by Azure role-based access control (Azure RBAC)
4848
4949
Subscription owners should assign the `Application Insights Snapshot Debugger` role to users who will inspect snapshots. This role can be assigned to individual users or groups by subscription owners for the target Application Insights resource or its resource group or subscription.
5050

51-
1. Navigate to the Application Insights resource in the Azure portal.
52-
1. Click **Access control (IAM)**.
53-
1. Click the **+Add role assignment** button.
54-
1. Select **Application Insights Snapshot Debugger** from the **Roles** drop-down list.
55-
1. Search for and enter a name for the user to add.
56-
1. Click the **Save** button to add the user to the role.
57-
5851
1. Assign the Debugger role to the **Application Insights Snapshot**.
5952

6053
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).

articles/azure-monitor/containers/container-insights-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ You can also manually grant this role from the Azure portal by performing the fo
2020

2121
1. Assign the **Publisher** role to the **Monitoring Metrics** scope.
2222

23-
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
23+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
2424

2525
## Container insights is enabled but not reporting any information
2626

articles/azure-monitor/logs/collect-sccm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ In the following procedure, you grant the *Contributor* role in your Log Analyti
4646
4747
1. Assign the Contributor role to the Log Analytics scope.
4848

49-
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).git
49+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
5050

5151
## Download and install the agent
5252

0 commit comments

Comments
 (0)