Skip to content

Commit 5b8d41d

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 0d424be + 3b0efa3 commit 5b8d41d

File tree

85 files changed

+1088
-539
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+1088
-539
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64969,6 +64969,11 @@
6496964969
{
6497064970
"source_path": "articles/app-service/quickstart-dotnet-framework.md",
6497164971
"redirect_url": "/azure/app-service/quickstart-dotnetcore?tabs=netframework48"
64972+
},
64973+
{
64974+
"source_path": "articles/virtual-desktop/rd-gateway-role.md",
64975+
"redirect_url": "/windows-server/remote/remote-desktop-services/remote-desktop-gateway-role",
64976+
"redirect_document_id": false
6497264977
}
6497364978
]
6497464979
}

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ The _Trusted IPs_ feature of Azure AD Multi-Factor Authentication bypasses multi
233233
> [!NOTE]
234234
> The trusted IPs can include private IP ranges only when you use MFA Server. For cloud-based Azure AD Multi-Factor Authentication, you can only use public IP address ranges.
235235
>
236-
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md#preview-features) interface.
236+
> IPv6 ranges are only supported in the [Named location (preview)](../conditional-access/location-condition.md) interface.
237237
238238
If your organization deploys the NPS extension to provide MFA to on-premises applications note the source IP address will always appear to be the NPS server the authentication attempt flows through.
239239

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ From this page, you can optionally limit the users and groups that will be subje
139139
For CAE, we only have insights into named IP-based named locations. We have no insights into other location settings like [MFA trusted IPs](../authentication/howto-mfa-mfasettings.md#trusted-ips) or country-based locations. When user comes from an MFA trusted IP or trusted locations that include MFA Trusted IPs or country location, CAE will not be enforced after user move to a different location. In those cases, we will issue a 1-hour CAE token without instant IP enforcement check.
140140

141141
> [!IMPORTANT]
142-
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md#preview-features) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
142+
> When configuring locations for continuous access evaluation, use only the [IP based Conditional Access location condition](../conditional-access/location-condition.md) and configure all IP addresses, **including both IPv4 and IPv6**, that can be seen by your identity provider and resources provider. Do not use country location conditions or the trusted ips feature that is available in Azure AD Multi-Factor Authentication's service settings page.
143143
144144
### IP address configuration
145145

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -285,7 +285,7 @@ Refer to the following list to configure managed identity for Azure Policy (in r
285285
- [PowerShell](../../governance/policy/how-to/remediate-resources.md#create-managed-identity-with-powershell)
286286
- [Azure CLI](/cli/azure/policy/assignment#az-policy-assignment-create)
287287
- [Azure Resource Manager templates](/azure/templates/microsoft.authorization/policyassignments)
288-
- [REST](/rest/api/resources/policyassignments/create)
288+
- [REST](/rest/api/policy/policyassignments/create)
289289

290290

291291
### Azure Service Fabric

articles/azure-cache-for-redis/cache-high-availability.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ Azure Cache for Redis implements high availability by using multiple VMs, called
1616

1717
| Option | Description | Availability | Standard | Premium | Enterprise |
1818
| ------------------- | ------- | ------- | :------: | :---: | :---: |
19-
| [Standard replication](#standard-replication)| Dual-node replicated configuration in a single datacenter with automatic failover | 99.9% |||-|
20-
| [Zone redundancy](#zone-redundancy) | Multi-node replicated configuration across AZs, with automatic failover | 99.95% (Premium tier), 99.99% (Enterprise tiers) |-|Preview|Preview|
21-
| [Geo-replication](#geo-replication) | Linked cache instances in two regions, with user-controlled failover | 99.999% (Enterprise tier) |-||Preview|
19+
| [Standard replication](#standard-replication)| Dual-node replicated configuration in a single datacenter with automatic failover | 99.9% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |||-|
20+
| [Zone redundancy](#zone-redundancy) | Multi-node replicated configuration across AZs, with automatic failover | Up to 99.99% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |-|Preview|Preview|
21+
| [Geo-replication](#geo-replication) | Linked cache instances in two regions, with user-controlled failover | Up to 99.999% (see [details](https://azure.microsoft.com/support/legal/sla/cache/v1_0/)) |-||Preview|
2222

2323
## Standard replication
2424

articles/azure-monitor/alerts/alerts-action-rules.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Action rules for Azure Monitor alerts
33
description: Understanding what action rules in Azure Monitor are and how to configure and manage them.
44
ms.topic: conceptual
5-
ms.date: 03/15/2021
5+
ms.date: 04/08/2021
66

77
---
88

@@ -63,7 +63,7 @@ The available filters are:
6363

6464
* **Severity**
6565
This rule will apply only to alerts with the selected severities.
66-
For example, **severity = Sev1** means that the rule will apply only to alerts with Sev1 severity.
66+
For example, **severity = "Sev1"** means that the rule will apply only to alerts with Sev1 severity.
6767
* **Monitor service**
6868
This rule will apply only to alerts coming from the selected monitoring services.
6969
For example, **monitor service = “Azure Backup”** means that the rule will apply only to backup alerts (coming from Azure Backup).
@@ -75,15 +75,22 @@ This rule will apply only to alerts coming from a specific alert rule. The value
7575
For example, **alert rule ID = "/subscriptions/SubId1/resourceGroups/RG1/providers/microsoft.insights/metricalerts/API-Latency"** means this rule will apply only to alerts coming from "API-Latency" metric alert rule.
7676
_NOTE - you can get the proper alert rule ID by listing your alert rules from the CLI, or by opening a specific alert rule in the portal, clicking "Properties", and copying the "Resource ID" value._
7777
* **Monitor condition**
78-
This rule will apply only to alert events with the specified monitor condition - either **Fired** or **Resolved**.
78+
This rule will apply only to alert events with the specified monitor condition - either **"Fired"** or **"Resolved"**.
7979
* **Description**
8080
This rule will apply only to alerts that contains a specific string in the alert description field. That field contains the alert rule description.
81-
For example, **description contains 'prod'** means that the rule will only match alerts that contain the string "prod" in their description.
81+
For example, **description contains "prod"** means that the rule will only match alerts that contain the string "prod" in their description.
8282
* **Alert context (payload)**
8383
This rule will apply only to alerts that contain any of one or more specific values in the alert context fields.
84-
For example, **alert context (payload) contains 'Computer-01'** means that the rule will only apply to alerts whose payload contain the string "Computer-01".
84+
For example, **alert context (payload) contains "Computer-01"** means that the rule will only apply to alerts whose payload contain the string "Computer-01".
8585

86-
If you set multiple filters in a rule, all of them apply. For example, if you set **resource type' = Virtual Machines** and **severity' = Sev0**, then the rule will apply only for Sev0 alerts on virtual machines.
86+
> [!NOTE]
87+
> Each filter may include up to five values.
88+
> For example, a filter on monitor service may include up to five monitor service names.
89+
90+
91+
92+
93+
If you set multiple filters in a rule, all of them apply. For example, if you set **resource type = "Virtual Machines"** and **severity = "Sev0"**, then the rule will apply only for Sev0 alerts on virtual machines.
8794

8895
![Action rule filters](media/alerts-action-rules/action-rules-new-rule-creation-flow-filters.png)
8996

articles/azure-monitor/app/sampling.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ The above code will disable adaptive sampling. Follow the steps below to add sam
179179
Use extension methods of `TelemetryProcessorChainBuilder` as shown below to customize sampling behavior.
180180

181181
> [!IMPORTANT]
182-
> If you use this method to configure sampling, please make sure to set the `aiOptions.EnableAdaptiveSampling` property to `false` when calling `AddApplicationInsightsTelemetry()`.
182+
> If you use this method to configure sampling, please make sure to set the `aiOptions.EnableAdaptiveSampling` property to `false` when calling `AddApplicationInsightsTelemetry()`. After making this change, you then need to follow the instructions in the code block below **exactly** in order to re-enable adaptive sampling with your customizations in place. Failure to do so can result in excess data ingestion. Always test post changing sampling settings, and set an appropriate [daily data cap](pricing.md#set-the-daily-cap) to help control your costs.
183183
184184
```csharp
185185
using Microsoft.ApplicationInsights.Extensibility

articles/azure-monitor/logs/cross-workspace-query.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes how you can query against resources from mul
44
ms.topic: conceptual
55
author: bwren
66
ms.author: bwren
7-
ms.date: 09/22/2020
7+
ms.date: 04/11/2021
88

99
---
1010

@@ -23,7 +23,7 @@ There are two methods to query data that is stored in multiple workspace and app
2323
## Cross-resource query limits
2424

2525
* The number of Application Insights resources and Log Analytics workspaces that you can include in a single query is limited to 100.
26-
* Cross-resource query is not supported in View Designer. You can Author a query in Log Analytics and pin it to Azure dashboard to [visualize a log query](../visualize/tutorial-logs-dashboards.md).
26+
* Cross-resource query is not supported in View Designer. You can Author a query in Log Analytics and pin it to Azure dashboard to [visualize a log query](../visualize/tutorial-logs-dashboards.md) or include in [Workbooks](../visualize/workbooks-overview.md).
2727
* Cross-resource queries in log alerts are only supported in the current [scheduledQueryRules API](/rest/api/monitor/scheduledqueryrules). If you're using the legacy Log Analytics Alerts API, you'll need to [switch to the current API](../alerts/alerts-log-api-switch.md).
2828

2929

@@ -37,15 +37,17 @@ Identifying a workspace can be accomplished one of several ways:
3737

3838
* Resource name - is a human-readable name of the workspace, sometimes referred to as *component name*.
3939

40+
>[!Note]
41+
>Because app and workspace names are not unique, this identifier might be ambiguous. When there are multiple instances of the resource name, reference should be by Qualified name, Resource ID, or Azure Resource ID.
42+
4043
`workspace("contosoretail-it").Update | count`
4144

42-
* Qualified name - is the full name of the workspace, composed of the subscription name, resource group, and component name in this format: *subscriptionName/resourceGroup/componentName*.
45+
* Qualified name - is the "full name" of the workspace, composed of the subscription name, resource group, and component name in this format: *subscriptionName/resourceGroup/componentName*.
4346

4447
`workspace('contoso/contosoretail/contosoretail-it').Update | count`
4548

4649
>[!NOTE]
47-
>Because Azure subscription names are not unique, this identifier might be ambiguous.
48-
>
50+
>Because Azure subscription names are not unique, this identifier might be ambiguous.
4951
5052
* Workspace ID - A workspace ID is the unique, immutable, identifier assigned to each workspace represented as a globally unique identifier (GUID).
5153

120 KB
Loading

0 commit comments

Comments
 (0)