Skip to content

Commit 89c889a

Browse files
authored
Merge pull request #161324 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 832e92d + 986537c commit 89c889a

File tree

34 files changed

+163
-63
lines changed

34 files changed

+163
-63
lines changed

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 05/27/2021
12+
ms.date: 06/07/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -80,6 +80,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
8080
| [Custom email verification](custom-email-mailjet.md) | NA | GA| |
8181
| [Customize the user interface with built-in templates](customize-ui.md) | GA| GA| |
8282
| [Customize the user interface with custom templates](customize-ui-with-html.md) | GA| GA| By using HTML templates. |
83+
| [Page layout version](page-layout.md) | GA | GA | |
8384
| [JavaScript](javascript-and-page-layout.md) | GA | GA | |
8485
| [Embedded sign-in experience](embedded-login.md) | NA | Preview| By using the inline frame element `<iframe>`. |
8586
| [Password complexity](password-complexity.md) | GA | GA | |

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/22/2021
12+
ms.date: 06/07/2021
1313
ms.custom: project-no-code, devx-track-js
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -59,7 +59,7 @@ To specify a page layout version for your user flow pages:
5959

6060
1. In your Azure AD B2C tenant, select **User flows**.
6161
1. Select your policy (for example, "B2C_1_SignupSignin") to open it.
62-
1. Select **Page layouts**. Choose a **Layout name**, and then choose the **Page Layout Version (Preview)**.
62+
1. Select **Page layouts**. Choose a **Layout name**, and then choose the **Page Layout Version**.
6363

6464
For information about the different page layout versions, see the [Page layout version change log](page-layout.md).
6565

6.23 KB
Loading

articles/active-directory-b2c/session-behavior.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/22/2021
11+
ms.date: 06/07/2021
1212
ms.custom: project-no-code
1313
ms.author: mimart
1414
ms.subservice: B2C
@@ -240,16 +240,18 @@ When you want to sign the user out of the application, it isn't enough to clear
240240

241241
Upon a sign-out request, Azure AD B2C:
242242

243-
1. Invalidates the Azure AD B2C cookie-based session.
244243
::: zone pivot="b2c-user-flow"
245-
2. Attempts to sign out from federated identity providers
244+
1. Invalidates the Azure AD B2C cookie-based session.
245+
1. Attempts to sign out from federated identity providers
246246
::: zone-end
247+
247248
::: zone pivot="b2c-custom-policy"
248-
3. Attempts to sign out from federated identity providers:
249+
1. Invalidates the Azure AD B2C cookie-based session.
250+
1. Attempts to sign out from federated identity providers:
249251
- OpenId Connect - If the identity provider well-known configuration endpoint specifies an `end_session_endpoint` location. The sign-out request doesn't pass the `id_token_hint` parameter. If the federated identity provider requires this parameter, the sign-out request will fail.
250252
- OAuth2 - If the [identity provider metadata](oauth2-technical-profile.md#metadata) contains the `end_session_endpoint` location.
251253
- SAML - If the [identity provider metadata](identity-provider-generic-saml.md) contains the `SingleLogoutService` location.
252-
4. Optionally, signs-out from other applications. For more information, see the [Single sign-out](#single-sign-out) section.
254+
1. Optionally, signs-out from other applications. For more information, see the [Single sign-out](#single-sign-out) section.
253255

254256
> [!NOTE]
255257
> You can disable the sign out from federated identity providers, by setting the identity provider technical profile metadata `SingleLogoutEnabled` to `false`.

articles/active-directory-b2c/tutorial-create-user-flows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 05/21/2021
11+
ms.date: 06/07/2021
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
zone_pivot_groups: b2c-policy-type
@@ -42,13 +42,13 @@ A user flow lets you determine how users interact with your application when the
4242

4343
::: zone pivot="b2c-user-flow"
4444
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
45-
- [Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
45+
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
4646
::: zone-end
4747

4848
::: zone pivot="b2c-custom-policy"
4949

5050
- If you don't have one already, [create an Azure AD B2C tenant](tutorial-create-tenant.md) that is linked to your Azure subscription.
51-
- [Register your application](tutorial-register-applications.md) in the tenant that you created so that it can communicate with Azure AD B2C.
51+
- [Register a web application](tutorial-register-applications.md), and [enable ID token implicit grant](tutorial-register-applications.md#enable-id-token-implicit-grant).
5252
- [Create a Facebook application](identity-provider-facebook.md#create-a-facebook-application). Skip the prerequisites and the reset of the steps in the [Set up sign-up and sign-in with a Facebook account](identity-provider-facebook.md) article. Although a Facebook application is not required for using custom policies, it's used in this walkthrough to demonstrate enabling social login in a custom policy.
5353

5454
::: zone-end

articles/aks/ingress-basic.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,6 @@ apiVersion: networking.k8s.io/v1
166166
kind: Ingress
167167
metadata:
168168
name: hello-world-ingress
169-
namespace: ingress-basic
170169
annotations:
171170
kubernetes.io/ingress.class: nginx
172171
nginx.ingress.kubernetes.io/ssl-redirect: "false"
@@ -202,7 +201,6 @@ apiVersion: networking.k8s.io/v1
202201
kind: Ingress
203202
metadata:
204203
name: hello-world-ingress-static
205-
namespace: ingress-basic
206204
annotations:
207205
kubernetes.io/ingress.class: nginx
208206
nginx.ingress.kubernetes.io/ssl-redirect: "false"
@@ -224,7 +222,7 @@ spec:
224222
Create the ingress resource using the `kubectl apply -f hello-world-ingress.yaml` command.
225223

226224
```
227-
$ kubectl apply -f hello-world-ingress.yaml
225+
$ kubectl apply -f hello-world-ingress.yaml --namespace ingress-basic
228226

229227
ingress.extensions/hello-world-ingress created
230228
ingress.extensions/hello-world-ingress-static created

articles/azure-resource-manager/templates/template-tutorial-quickstart-template.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ This template works for deploying storage accounts and app service plans, but yo
3030

3131
1. Open [Azure Quickstart templates](https://azure.microsoft.com/resources/templates/)
3232
1. In **Search**, enter _deploy linux web app_.
33-
1. Select the tile with the title **Deploy a basic Linux web app**. If you have trouble finding it, here's the [direct link](https://azure.microsoft.com/resources/templates/101-webapp-basic-linux/).
33+
1. Select the tile with the title **Deploy a basic Linux web app**. If you have trouble finding it, here's the [direct link](https://azure.microsoft.com/en-us/resources/templates/webapp-basic-linux/).
3434
1. Select **Browse on GitHub**.
3535
1. Select _azuredeploy.json_.
3636
1. Review the template. In particular, look for the `Microsoft.Web/sites` resource.

articles/azure-video-analyzer/video-analyzer-docs/detect-motion-record-video-clips-cloud.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -983,6 +983,23 @@ Within few seconds, you should see the following response in the OUTPUT window
983983

984984
Status code of 200 indicates that the pipeline topology was successfully deleted.
985985

986+
## Playing back the recording
987+
988+
You can examine the Video Analyzer video resource that was created by the live pipeline by logging in to the Azure portal and viewing the video.
989+
1. Open your web browser, and go to the [Azure portal](https://portal.azure.com/). Enter your credentials to sign in to the portal. The default view is your service dashboard.
990+
1. Locate your Video Analyzer account among the resources you have in your subscription, and open the account pane.
991+
1. Select **Videos** in the **Video Analyzers** list.
992+
1. You'll find a video listed with the name `sample-motion-video-camera001`. This is the name chosen in your pipeline topology file.
993+
1. Select the video.
994+
1. The video details page will open and the playback should start automatically.
995+
996+
<!--TODO: add image -- ![Video playback]() TODO: new screenshot is needed here -->
997+
998+
999+
> [!NOTE]
1000+
> Because the source of the video was a container simulating a camera feed, the time stamps in the video are related to when you activated the live pipeline and when you deactivated it.
1001+
1002+
9861003
## Clean up resources
9871004

9881005
[!INCLUDE [prerequisites](./includes/common-includes/clean-up-resources.md)]

articles/azure-video-analyzer/video-analyzer-docs/record-event-based-live-video.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -350,17 +350,15 @@ When you deactivate the live pipeline, the video sink node stops recording media
350350
351351
This event indicates that recording has stopped. The subject section in applicationProperties references the video sink node in the live pipeline, which generated this message. The body section contains information about the output location. In this case, it's the name of the Video Analyzer resource into which video is recorded.
352352
353-
## Video Analyzer video resource
353+
## Playing back the recording
354354
355355
You can examine the Video Analyzer video resource that was created by the live pipeline by logging in to the Azure portal and viewing the video.
356356
1. Open your web browser, and go to the [Azure portal](https://portal.azure.com/). Enter your credentials to sign in to the portal. The default view is your service dashboard.
357357
1. Locate your Video Analyzer account among the resources you have in your subscription, and open the account pane.
358358
1. Select **Videos** in the **Video Analyzers** list.
359-
360-
<!--TODO: add image -- ![Video Analyzers videos]() ./media/event-based-video-recording-tutorial/videos.png -->
361359
1. You'll find a video listed with the name `sample-evr-video`. This is the name chosen in your pipeline topology file.
362360
1. Select the video.
363-
1. On the video details page, select playback option <!-- TODO: fix this-->
361+
1. The video details page will open and the playback should start automatically.
364362
365363
<!--TODO: add image -- ![Video playback]() TODO: new screenshot is needed here -->
366364

articles/backup/backup-azure-monitoring-built-in-monitor.md

Lines changed: 84 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -117,16 +117,95 @@ To inactivate/resolve an active alert, you can select the list item correspondin
117117

118118
## Azure Monitor alerts for Azure Backup (preview)
119119

120-
Azure Backup also provides alerts via Azure Monitor, to enable users to have a consistent experience for alert management across different Azure services, including backup. With Azure Monitor alerts, you can route alerts to any notification channel supported by Azure Backup such as email, ITSM, Webhook, Logic App and so on.
120+
Azure Backup also provides alerts via Azure Monitor, to enable users to have a consistent experience for alert management across different Azure services, including backup. With Azure Monitor alerts, you can route alerts to any notification channel supported by Azure Monitor such as email, ITSM, Webhook, Logic App and so on.
121121

122-
Currently, this feature is available for Azure Databases for PostgreSQL Server, Azure Blobs and Azure Managed Disks. Alerts are generated for the following scenarios and can be accessed by navigating to a Backup vault and clicking on the **Alerts** menu item:
122+
Currently, Azure Backup has made two main types of built-in alerts available:
123123

124-
- Delete Backup Data
125-
- Backup Failure (to get alerts for Backup Failure, you need to register the AFEC flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** via the preview portal)
126-
- Restore Failure (to get alerts for Restore Failure, you need to register the AFEC flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** via the preview portal)
124+
* **Security Alerts**: For scenarios, such as deletion of backup data, or disabling of soft-delete functionality for a vault, security alerts (of severity Sev 0) are fired, and displayed in the Azure portal or consumed via other clients (PowerShell, CLI and REST API). Security alerts are generated by default and can't be turned off. However, you can control the scenarios for which the notifications (for example, emails) should be fired. For more information on how to configure notifications, see [Action rules](../azure-monitor/alerts/alerts-action-rules.md).
125+
* **Job Failure Alerts**: For scenarios, such as backup failure and restore failure, Azure Backup provides built-in alerts via Azure Monitor (of Severity Sev 1). Unlike security alerts, you can choose to turn off Azure Monitor alerts for job failure scenarios. For example, if you have already configured custom alert rules for job failures via Log Analytics, and don't need built-in alerts to be fired for every job failure. By default, alerts for job failures are turned off. Refer to the [section on turning on alerts for these scenarios](#turning-on-azure-monitor-alerts-for-job-failure-scenarios) for more details.
126+
127+
The following table summarizes the different backup alerts currently available (in preview) via Azure Monitor and the supported workload/vault types:
128+
129+
| **Alert Category** | **Alert Name** | **Supported workload types / vault types** | **Description** |
130+
| ------------------ | ------------- | ------------------------------------------ | -------- |
131+
| Security | Delete Backup Data | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM <br><br> <li> Azure Backup Agent <br><br> <li> DPM <br><br> <li> Azure Backup Server <br><br> <li> Azure Database for PostgreSQL Server <br><br> <li> Azure Blobs <br><br> <li> Azure Managed Disks | This alert is fired when a user stops backup and deletes backup data (Note – If soft-delete feature is disabled for the vault, Delete Backup Data alert is not received) |
132+
| Security | Upcoming Purge | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM | For all workloads which support soft-delete, this alert is fired when the backup data for an item is 2 days away from being permanently purged by the Azure Backup service |
133+
| Security | Purge Complete | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM | Delete Backup Data |
134+
| Security | Soft Delete Disabled for Vault | Recovery Services vaults | This alert is fired when the soft-deleted backup data for an item has been permanently deleted by the Azure Backup service |
135+
| Jobs | Backup Failure | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM <br><br> <li> Azure Backup Agent <br><br> <li> Azure Files <br><br> <li> Azure Database for PostgreSQL Server <br><br> <li> Azure Blobs <br><br> <li> Azure Managed Disks | This alert is fired when a backup job failure has occurred. By default, alerts for backup failures are turned off. Refer to the [section on turning on alerts for this scenario](#turning-on-azure-monitor-alerts-for-job-failure-scenarios) for more details. |
136+
| Jobs | Restore Failure | <li> Azure Virtual Machine <br><br> <li> SQL in Azure VM (non-AG scenarios) <br><br> <li> SAP HANA in Azure VM <br><br> <li> Azure Backup Agent <br><br> <li> Azure Files <br><br> <li> Azure Database for PostgreSQL Server <br><br> <li> Azure Blobs <br><br> <li> Azure Managed Disks| This alert is fired when a restore job failure has occurred. By default, alerts for restore failures are turned off. Refer to the [section on turning on alerts for this scenario](#turning-on-azure-monitor-alerts-for-job-failure-scenarios) for more details. |
137+
138+
### Turning on Azure Monitor alerts for job failure scenarios
139+
140+
To opt-in to Azure Monitor alerts for backup failure and restore failure scenarios, follow the below steps:
141+
142+
1. Navigate to the Azure portal and search for **Preview Features**.
143+
144+
![Preview Features](media/backup-azure-monitoring-laworkspace/portal-preview-features.png)
145+
146+
2. You can view the list of all preview features that are available for you to opt-in to.
147+
148+
* If you wish to receive job failure alerts for workloads backed up to Recovery Services vaults, select the flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** corresponding to Microsoft.RecoveryServices provider (column 3).
149+
* If you wish to receive job failure alerts for workloads backed up to Backup vaults, select the flag named **EnableAzureBackupJobFailureAlertsToAzureMonitor** corresponding to Microsoft.DataProtection provider (column 3).
150+
151+
![Alerts Preview](media/backup-azure-monitoring-laworkspace/alert-preview-feature-flags.png)
152+
153+
3. Click **Register** to enable this feature for your subscription.
154+
> [!NOTE]
155+
> It may take up to 30 minutes for the registration to take effect. If you wish to enable this feature for multiple subscriptions, repeat the above process by selecting the relevant subscription at the top of the screen.
156+
157+
158+
### Viewing fired alerts in the Azure portal
159+
160+
Once an alert is fired for a vault, you can view the alert in the Azure portal by navigating to the vault and clicking on the **Alerts** menu item. Clicking this shows a distribution of alerts by severity for this vault.
161+
162+
![Viewing Alerts](media/backup-azure-monitoring-laworkspace/vault-azure-monitor-alerts.png)
163+
164+
Clicking on any of the numbers opens up a list of all alerts fired with the given severity. You can click any of the alerts to get more details about the alert, such as the affected datasource, alert description and recommended action, and so on.
165+
166+
![Alert Details](media/backup-azure-monitoring-laworkspace/azure-monitor-alert-details.png)
167+
168+
You can change the state of an alert to **Acknowledged** or **Closed** by clicking on **Change Alert State**.
169+
170+
![Change Alert State](media/backup-azure-monitoring-laworkspace/azure-monitor-change-alert-state.png)
127171

128172
For more information about Azure Monitor alerts, see [Overview of alerts in Azure](../azure-monitor/alerts/alerts-overview.md).
129173

174+
### Configuring notifications for alerts
175+
176+
To configure notifications for Azure Monitor alerts, you must create an action rule. The following steps demonstrate how to create an action rule to send email notifications to a given email address. Similar instructions will apply for routing these alerts to other notification channels, such as ITSM, webhook, logic app and so on.
177+
178+
1. Navigate to **Azure Monitor** in the Azure portal. Click the **Alerts** menu item and select **Manage actions**.
179+
180+
![Manage Actions](media/backup-azure-monitoring-laworkspace/azure-monitor-manage-actions.png)
181+
182+
2. Navigate to the **Action rules (preview)** tab and click **New action rule**.
183+
184+
![New Action Rule](media/backup-azure-monitoring-laworkspace/azure-monitor-create-action-rule.png)
185+
186+
3. Select the scope for which the action rule should be applied. You can apply the action rule for all resources within a subscription. Optionally, you can also apply filters on the alerts, for example, to only generate notifications for alerts of a certain severity.
187+
188+
![Action Rule Scope](media/backup-azure-monitoring-laworkspace/azure-monitor-action-rule-scope.png)
189+
190+
4. Create an action group. An action group is the destination to which the notification for an alert should be sent, for example, an email address.
191+
192+
![Create Action Group](media/backup-azure-monitoring-laworkspace/azure-monitor-create-action-group.png)
193+
194+
5. On the **Basics** tab, select the name of the action group and the subscription and resource group under which it should be created.
195+
196+
![Action Groups Basic](media/backup-azure-monitoring-laworkspace/azure-monitor-action-groups-basic.png)
197+
198+
6. On the **Notifications** tab, select **Email/SMS message/Push/Voice** and enter the recipient email id.
199+
200+
![Action Groups Notification](media/backup-azure-monitoring-laworkspace/azure-monitor-email.png)
201+
202+
7. Click **Review+Create** and then **Create** to deploy the action group.
203+
204+
8. Finally, save the action rule.
205+
206+
[Learn more about Action Rules in Azure Monitor](../azure-monitor/alerts/alerts-action-rules.md)
207+
208+
130209
## Next steps
131210

132211
[Monitor Azure Backup workloads using Azure Monitor](backup-azure-monitoring-use-azuremonitor.md)

0 commit comments

Comments
 (0)