You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/configure-authentication-sample-spa-app.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -131,10 +131,10 @@ Now that you've obtained the SPA sample, update the code with your Azure AD B2C
131
131
|---------|---------|---------|
132
132
|authConfig.js|clientId| The SPA ID from [step 2.3](#step-23-register-the-spa).|
133
133
|policies.js| names| The user flows, or custom policy you created in [step 1](#step-1-configure-your-user-flow).|
134
-
|policies.js|authorities|Your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`). Then, replace with the user flows, or custom policy you created in [step 1](#step-1-configure-your-user-flow) (for example, `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<your-sign-in-sign-up-policy>`).|
135
-
|policies.js|authorityDomain|Your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
134
+
|policies.js|authorities|Your Azure AD B2C user flows or custom policies authorities such as `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<your-sign-in-sign-up-policy>`. Replace `your-sign-in-sign-up-policy` with user flow or custom policy you created in [step 1](#sign-in-flow)|
135
+
|policies.js|authorityDomain|Your Azure AD B2C authority domain such as `<your-tenant-name>.b2clogin.com`.|
136
136
|apiConfig.js|b2cScopes|The web API scopes you created in [step 2.2](#step-22-configure-scopes) (for example, `b2cScopes: ["https://<your-tenant-name>.onmicrosoft.com/tasks-api/tasks.read"]`).|
137
-
|apiConfig.js|webApi|The URL of the web API, `http://localhost:5000/tasks`.|
137
+
|apiConfig.js|webApi|The URL of the web API, `http://localhost:5000/hello`.|
138
138
| | | |
139
139
140
140
Your resulting code should look similar to following sample:
@@ -196,6 +196,8 @@ The connection string specifies the login name that SQL insights should use when
196
196
The connections string will vary for each type of SQL resource:
197
197
198
198
#### Azure SQL Database
199
+
TCP connections from the monitoring machine to the IP address and port used by the database must be allowed by any firewalls or [network security groups](../../virtual-network/network-security-groups-overview.md) (NSGs) that may exist on the network path. For details on IP addresses and ports, see [Azure SQL Database connectivity architecture](../../azure-sql/database/connectivity-architecture.md).
200
+
199
201
Enter the connection string in the form:
200
202
201
203
```
@@ -208,36 +210,53 @@ Get the details from the **Connection strings** menu item for the database.
To monitor a readable secondary, include the key-value `ApplicationIntent=ReadOnly`in the connection string. SQL Insights supports monitoring a single secondary. The collected data will be tagged to reflect primary or secondary.
213
+
To monitor a readable secondary, append `;ApplicationIntent=ReadOnly`to the connection string. SQL Insights supports monitoring a single secondary. The collected data will be tagged to reflect primary or secondary.
212
214
213
215
#### Azure SQL Managed Instance
216
+
TCP connections from the monitoring machine to the IP address and port used by the managed instance must be allowed by any firewalls or [network security groups](../../virtual-network/network-security-groups-overview.md) (NSGs) that may exist on the network path. For details on IP addresses and ports, see [Azure SQL Managed Instance connection types](../../azure-sql/managed-instance/connection-types-overview.md).
Get the details from the **Connection strings** menu item for the managed instance.
222
-
225
+
Get the details from the **Connection strings** menu item for the managed instance. If using managed instance [public endpoint](../../azure-sql/managed-instance/public-endpoint-configure.md), replace port 1433 with 3342.
To monitor a readable secondary, include the key-value `ApplicationIntent=ReadOnly`in the connection string. SQL Insights supports monitoring of a single secondary. Collected data will be tagged to reflect Primary or Secondary.
229
+
To monitor a readable secondary, append `;ApplicationIntent=ReadOnly`to the connection string. SQL Insights supports monitoring of a single secondary. Collected data will be tagged to reflect Primary or Secondary.
227
230
228
231
#### SQL Server
232
+
The TCP/IP protocol must be enabled for the SQL Server instance you want to monitor. TCP connections from the monitoring machine to the IP address and port used by the SQL Server instance must be allowed by any firewalls or [network security groups](../../virtual-network/network-security-groups-overview.md) (NSGs) that may exist on the network path.
233
+
234
+
If you want to monitor SQL Server configured for high availability (using either availability groups or failover cluster instances), we recommend monitoring each SQL Server instance in the cluster individually rather than connecting via an availability group listener or a failover cluster name. This ensures that monitoring data is collected regardless of the current instance role (primary or secondary).
If your monitoring virtual machine is in the same VNET, use the private IP address of the Server. Otherwise, use the public IP address. If you're using Azure SQL virtual machine, you can see which port to use here on the **Security** page for the resource.
244
+
Use the IP address that the SQL Server instance listens on.
245
+
246
+
If your SQL Server instance is configured to listen on a non-default port, replace 1433 with that port number in the connection string. If you're using Azure SQL virtual machine, you can see which port to use on the **Security** page for the resource.
For any SQL Server instance, you can determine all IP addresses and ports it is listening on by connecting to the instance and executing the following T-SQL query, as long as there is at least one TCP connection to the instance:
251
+
252
+
```sql
253
+
SELECT DISTINCT local_net_address, local_tcp_port
254
+
FROMsys.dm_exec_connections
255
+
WHERE net_transport ='TCP'
256
+
AND
257
+
protocol_type ='TSQL';
258
+
```
259
+
241
260
## Monitoring profile created
242
261
243
262
Select **Add monitoring virtual machine** to configure the virtual machine to collect data from your SQL resources. Do not return to the **Overview** tab. In a few minutes, the Status column should change to read "Collecting", you should see data for the SQL resources you have chosen to monitor.
@@ -20,8 +20,18 @@ The new link feature in Azure SQL Managed Instance connects your SQL Servers h
20
20
21
21
After a disastrous event, you can continue running your read-only workloads on SQL Managed Instance in Azure. You can also choose to migrate one or more applications from SQL Server to SQL Managed Instance at the same time, at your own pace, and with the best possible minimum downtime compared to other solutions in Azure today.
22
22
23
-
> [!NOTE]
24
-
> The link feature is released in limited public preview with support for currently only SQL Server 2019 Enterprise Edition CU13 (or above). [Sign-up now](https://aka.ms/mi-link-signup) to participate in the limited public preview.
23
+
## Sign-up for link
24
+
25
+
To use the link feature, you will need:
26
+
27
+
- SQL Server 2019 Enterprise Edition with [CU13 (or above)](https://support.microsoft.com/topic/kb5005679-cumulative-update-13-for-sql-server-2019-5c1be850-460a-4be4-a569-fe11f0adc535) installed on-premises, or on an Azure VM.
28
+
- Network connectivity between your SQL Server and managed instance is required. If your SQL Server is running on-premises, use a VPN link or Express route. If your SQL Server is running on an Azure VM, either deploy your VM to the same subnet as your managed instance, or use global VNet peering to connect two separate subnets.
29
+
- Azure SQL Managed Instance provisioned on any service tier.
30
+
31
+
Use the following link to sign-up for the limited preview of the link feature.
32
+
33
+
> [!div class="nextstepaction"]
34
+
> [Sign up for link feature preview](https://aka.ms/mi-link-signup)
25
35
26
36
## Overview
27
37
@@ -71,18 +81,8 @@ Secure connectivity, such as VPN or Express Route is used between an on-premises
71
81
72
82
There could exist up to 100 links from the same, or various SQL Server sources to a single SQL Managed Instance. This limit is governed by the number of databases that could be hosted on a managed instance at this time. Likewise, a single SQL Server can establish multiple parallel database replication links with several managed instances in different Azure regions in a 1 to 1 relationship between a database and a managed instance . The feature requires CU13 or higher to be installed on SQL Server 2019.
73
83
74
-
## Sign-up for link
75
-
76
-
To use the link feature, you will need:
77
-
78
-
- SQL Server 2019 Enterprise Edition with [CU13 (or above)](https://support.microsoft.com/topic/kb5005679-cumulative-update-13-for-sql-server-2019-5c1be850-460a-4be4-a569-fe11f0adc535) installed on-premises, or on an Azure VM.
79
-
- Network connectivity between your SQL Server and managed instance is required. If your SQL Server is running on-premises, use a VPN link or Express route. If your SQL Server is running on an Azure VM, either deploy your VM to the same subnet as your managed instance, or use global VNet peering to connect two separate subnets.
80
-
- Azure SQL Managed Instance provisioned on any service tier.
81
-
82
-
Use the following link to sign-up for the limited preview of the link feature.
83
-
84
-
> [!div class="nextstepaction"]
85
-
> [Sign up for link feature preview](https://aka.ms/mi-link-signup)
84
+
> [!NOTE]
85
+
> The link feature is released in limited public preview with support for currently only SQL Server 2019 Enterprise Edition CU13 (or above). [Sign-up now](https://aka.ms/mi-link-signup) to participate in the limited public preview.
Copy file name to clipboardExpand all lines: articles/hpc-cache/configuration.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: Configure Azure HPC Cache settings
3
3
description: Explains how to configure additional settings for the cache like MTU, custom NTP and DNS configuration, and how to access the express snapshots from Azure Blob storage targets.
4
-
author: femila
4
+
author: ronhogue
5
5
ms.service: hpc-cache
6
6
ms.topic: how-to
7
7
ms.date: 04/08/2021
8
-
ms.author: femila
8
+
ms.author: rohogue
9
9
---
10
10
11
11
# Configure additional Azure HPC Cache settings
@@ -76,7 +76,7 @@ Consider using a test cache to check and refine your DNS setup before you use it
76
76
77
77
### Refresh storage target DNS
78
78
79
-
If your DNS server updates IP addresses, the associated NFS storage targets will become temporarily unavailable. Read how to update your custom DNS system IP addresses in [View and manage storage targets](manage-storage-targets.md#update-ip-address-custom-dns-configurations-only).
79
+
If your DNS server updates IP addresses, the associated NFS storage targets will become temporarily unavailable. Read how to update your custom DNS system IP addresses in [View and manage storage targets](manage-storage-targets.md#update-ip-address-specific-configurations-only).
0 commit comments