Skip to content

Commit 9d47be3

Browse files
authored
Merge pull request #193409 from MicrosoftDocs/main
3/30 AM Publish
2 parents abfcbe3 + e1a52ec commit 9d47be3

File tree

129 files changed

+747
-285
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

129 files changed

+747
-285
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10775,11 +10775,6 @@
1077510775
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/managed-identities-status",
1077610776
"redirect_document_id": false
1077710777
},
10778-
{
10779-
"source_path": "articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md",
10780-
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring",
10781-
"redirect_document_id": false
10782-
},
1078310778
{
1078410779
"source_path": "articles/active-directory/manage-apps/get-it-now-azure-marketplace.md",
1078510780
"redirect_url": "/azure/active-directory/manage-apps/add-application-portal",

CODEOWNERS

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@
55
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
66

77
# Azure Policy: Samples and Compliance Controls
8-
/articles/**/policy-reference.md @timwarner
9-
/articles/**/security-controls-policy.md @timwarner
10-
/includes/policy/ @timwarner
8+
/articles/**/policy-reference.md @timwarner-msft
9+
/articles/**/security-controls-policy.md @timwarner-msft
10+
/includes/policy/ @timwarner-msft
1111

1212
# Azure Monitor
1313
articles/azure-monitor/* @bwren
@@ -57,7 +57,7 @@ articles/service-health @rboucher
5757
/articles/container-registry/ @dlepow @mimckitt
5858

5959
# Governance
60-
/articles/governance/ @timwarner
60+
/articles/governance/ @timwarner-msft
6161

6262
# Security
6363
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear

articles/active-directory-b2c/userjourneys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ Preconditions can check multiple preconditions. The following example checks whe
219219
Identity provider selection lets users select an action from a list of options. The identity provider selection consists of a pair of two orchestration steps:
220220

221221
1. **Buttons** - It starts with type of `ClaimsProviderSelection`, or `CombinedSignInAndSignUp` that contains a list of options a user can choose from. The order of the options inside the `ClaimsProviderSelections` element controls the order of the buttons presented to the user.
222-
2. **Actions** - Followed by type of `ClaimsExchange`. The ClaimsExchange contains list of actions. The action is a reference to a technical profile, such as [OAuth2](oauth2-technical-profile.md), [OpenID Connect](openid-connect-technical-profile.md), [claims transformation](claims-transformation-technical-profile.md), or [self-asserted](self-asserted-technical-profile.md). The When a user clicks on one of the buttons, the corresponding action is executed.
222+
2. **Actions** - Followed by type of `ClaimsExchange`. The ClaimsExchange contains list of actions. The action is a reference to a technical profile, such as [OAuth2](oauth2-technical-profile.md), [OpenID Connect](openid-connect-technical-profile.md), [claims transformation](claims-transformation-technical-profile.md), or [self-asserted](self-asserted-technical-profile.md). When a user clicks on one of the buttons, the corresponding action is executed.
223223

224224
The **ClaimsProviderSelections** element contains the following element:
225225

articles/active-directory/fundamentals/custom-security-attributes-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Here are some of the limits and constraints for custom security attributes.
149149
> | Predefined values per attribute definition | 100 | |
150150
> | Attribute value length | 64 | Unicode characters |
151151
> | Attribute values assigned per object | 50 | Values can be distributed across single and multi-valued attributes.<br/>Example: 5 attributes with 10 values each or 50 attributes with 1 value each |
152-
> | Characters not allowed for:<br/>Attribute set name<br/>Attribute name | ``<space> ` ~ ! @ # $ % ^ & * ( ) _ - + = { [ } ] \| \ : ; " ' < , > . ? /`` | |
152+
> | Characters not allowed for:<br/>Attribute set name<br/>Attribute name | ``<space> ` ~ ! @ # $ % ^ & * ( ) _ - + = { [ } ] \| \ : ; " ' < , > . ? /`` | Attribute set name and attribute name cannot start with a number |
153153
> | Characters not allowed for:<br/>Attribute values | `# % & * + \ : " / < > ?` | |
154154
155155
## Custom security attribute roles
Lines changed: 92 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,92 @@
1+
---
2+
title: Azure Active Directory SLA performance | Microsoft Docs
3+
description: Learn about the Azure AD SLA performance
4+
services: active-directory
5+
documentationcenter: ''
6+
author: MarkusVi
7+
manager: karenhoran
8+
editor: ''
9+
10+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.subservice: report-monitor
16+
ms.date: 03/15/2022
17+
ms.author: markvi
18+
ms.reviewer: besiler
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Azure Active Directory SLA performance
24+
25+
As an identity admin, you may need to track Azure AD's service-level agreement (SLA) performance to make sure Azure AD can support your vital apps. This article shows how the Azure AD service has performed according to the [SLA for Azure Active Directory (Azure AD)](https://azure.microsoft.com/support/legal/sla/active-directory/v1_1/).
26+
27+
You can use this article in discussions with app or business owners to help them understand the performance they can expect from Azure AD.
28+
29+
30+
## Service availability commitment
31+
32+
Microsoft offers Premium Azure AD customers the opportunity to get a service credit if Azure AD fails to meet the documented SLA. When you request a service credit, Microsoft evaluates the SLA for your specific tenant; however, this global SLA can give you an indication of the general health of Azure AD over time.
33+
34+
The SLA covers the following scenarios that are vital to businesses:
35+
36+
- **User authentication:** Users are able to login to the Azure Active Directory service.
37+
38+
- **App access:** Azure Active Directory successfully emits the authentication and authorization tokens required for users to log into applications connected to the service.
39+
40+
For full details on SLA coverage and instructions on requesting a service credit, see the [SLA for Azure Active Directory (Azure AD)](https://azure.microsoft.com/support/legal/sla/active-directory/v1_1/).
41+
42+
43+
## No planned downtime
44+
45+
You rely on Azure AD to provide identity and access management for your vital systems. To ensure Azure AD is available when business operations require it, Microsoft does not plan downtime for Azure AD system maintenance. Instead, maintenance is performed as the service runs, without customer impact.
46+
47+
## Recent worldwide SLA performance
48+
49+
To help you plan for moving workloads to Azure AD, we publish past SLA performance. These numbers show the level at which Azure AD met the requirements in the [SLA for Azure Active Directory (Azure AD)](https://azure.microsoft.com/support/legal/sla/active-directory/v1_1/), for all tenants.
50+
51+
For each month, we truncate the SLA attainment at three places after the decimal. Numbers are not rounded up, so actual SLA attainment is higher than indicated.
52+
53+
54+
| Month | 2021 | 2022 |
55+
| --- | --- | --- |
56+
| January | | 99.999% |
57+
| February | 99.999% | 99.999% |
58+
| March | 99.568% | |
59+
| April | 99.999% | |
60+
| May | 99.999% | |
61+
| June | 99.999% | |
62+
| July | 99.999% | |
63+
| August | 99.999% | |
64+
| September | 99.999% | |
65+
| October | 99.999% | |
66+
| November | 99.998% | |
67+
| December | 99.978% | |
68+
69+
70+
71+
### How is Azure AD SLA measured?
72+
73+
The Azure AD SLA is measured in a way that reflects customer authentication experience, rather than simply reporting on whether the system is available to outside connections. This means that the calculation is based on whether:
74+
75+
- Users can authenticate
76+
- Azure AD successfully issues tokens for target apps after authentication
77+
78+
The numbers above are a global total of Azure AD authentications across all customers and geographies.
79+
80+
81+
## Incident history
82+
83+
All incidents that seriously impact Azure AD performance are documented in the [Azure status history](https://status.azure.com/status/history/). Not all events documented in Azure status history are serious enough to cause Azure AD to go below its SLA. You can view information about the impact of incidents, as well as a root cause analysis of what caused the incident and what steps Microsoft took to prevent future incidents.
84+
85+
86+
87+
88+
## Next steps
89+
90+
* [Azure AD reports overview](overview-reports.md)
91+
* [Programmatic access to Azure AD reports](concept-reporting-api.md)
92+
* [Azure Active Directory risk detections](../identity-protection/overview-identity-protection.md)

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,8 @@
104104
- name: Reference
105105
expanded: true
106106
items:
107+
- name: Azure Active Directory SLA performance
108+
href: reference-azure-ad-sla-performance.md
107109
- name: Basic info in the sign-in logs
108110
href: reference-basic-info-sign-in-logs.md
109111
- name: Azure AD PowerShell cmdlets for reporting
@@ -138,8 +140,6 @@
138140
href: workbook-sensitive-operations-report.md
139141
- name: Recommendations
140142
items:
141-
- name: Convert from per-user MFA to conditional access MFA
142-
href: recommendation-convert-to-conditional-access-mfa.md
143143
- name: Integrate your third party apps
144144
href: recommendation-integrate-third-party-apps.md
145145
- name: Migrate to Microsoft authenticator

articles/app-service/includes/tutorial-nodejs-mongodb-app/deploy-visual-studio-code-4.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ ms.author: daberry
44
ms.topic: include
55
ms.date: 01/30/2022
66
---
7-
A notification will appear in the bottom right-hand corner of VS code to inform you the deployment is underway. When deployment is complete, this notification will be replaced by a dialog box allowing you to browse to the website.
7+
A notification will appear in the bottom right-hand corner of VS Code to inform you the deployment is underway. When deployment is complete, this notification will be replaced by a dialog box allowing you to browse to the website.

articles/azure-functions/create-first-function-cli-python.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -255,18 +255,18 @@ Use the following commands to create these items. Both Azure CLI and PowerShell
255255
# [Azure CLI](#tab/azure-cli)
256256

257257
```azurecli
258-
az functionapp create --consumption-plan-location westeurope --runtime python --runtime-version 3.8 --functions-version 3 --name <APP_NAME> --os-type linux --storage-account <STORAGE_NAME>
258+
az functionapp create --consumption-plan-location westeurope --runtime python --runtime-version 3.9 --functions-version 4 --name <APP_NAME> --os-type linux --storage-account <STORAGE_NAME>
259259
```
260260

261-
The [az functionapp create](/cli/azure/functionapp#az-functionapp-create) command creates the function app in Azure. If you are using Python 3.7 or 3.6, change `--runtime-version` to `3.7` or `3.6`, respectively. You must supply `--os-type linux` because Python functions can't run on Windows, which is the default.
261+
The [az functionapp create](/cli/azure/functionapp#az-functionapp-create) command creates the function app in Azure. If you are using Python 3.8, 3.7, or 3.6, change `--runtime-version` to `3.8`, `3.7`, or `3.6`, respectively. You must supply `--os-type linux` because Python functions can't run on Windows, which is the default.
262262

263263
# [Azure PowerShell](#tab/azure-powershell)
264264

265265
```azurepowershell
266-
New-AzFunctionApp -Name <APP_NAME> -ResourceGroupName AzureFunctionsQuickstart-rg -StorageAccount <STORAGE_NAME> -FunctionsVersion 3 -RuntimeVersion 3.8 -Runtime python -Location '<REGION>'
266+
New-AzFunctionApp -Name <APP_NAME> -ResourceGroupName AzureFunctionsQuickstart-rg -StorageAccountName <STORAGE_NAME> -FunctionsVersion 4 -RuntimeVersion 3.9 -Runtime python -Location '<REGION>'
267267
```
268268

269-
The [New-AzFunctionApp](/powershell/module/az.functions/new-azfunctionapp) cmdlet creates the function app in Azure. If you're using Python 3.7 or 3.6, change `-RuntimeVersion` to `3.7` or `3.6`, respectively.
269+
The [New-AzFunctionApp](/powershell/module/az.functions/new-azfunctionapp) cmdlet creates the function app in Azure. If you're using Python 3.8, 3.7, or 3.6, change `-RuntimeVersion` to `3.8`, `3.7`, or `3.6`, respectively.
270270

271271
---
272272

articles/azure-sql/database/elastic-pool-resource-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: dimitri-furman
1111
ms.author: dfurman
1212
ms.reviewer: kendralittle, mathoma, jackli, wiassaf
13-
ms.date: 1/24/2022
13+
ms.date: 3/30/2022
1414
---
1515

1616
# Resource management in dense elastic pools
@@ -55,7 +55,7 @@ To send an alert when pool resource utilization (CPU, data IO, log IO, workers,
5555
|`max_worker_percent`|[Worker thread](/sql/relational-databases/thread-and-task-architecture-guide) utilization. Provided for each database in the pool, as well as for the pool itself. There are different limits on the number of worker threads at the database level, and at the pool level, therefore monitoring this metric at both levels is recommended. Available in the [sys.dm_db_resource_stats](/sql/relational-databases/system-dynamic-management-views/sys-dm-db-resource-stats-azure-sql-database) view in every database, and in the [sys.elastic_pool_resource_stats](/sql/relational-databases/system-catalog-views/sys-elastic-pool-resource-stats-azure-sql-database) view in the `master` database. This metric is also emitted to Azure Monitor, where it is [named](../../azure-monitor/essentials/metrics-supported.md#microsoftsqlserverselasticpools) `workers_percent`, and can be viewed in Azure portal.|Below 80%. Spikes up to 100% will cause connection attempts and queries to fail.|
5656
|`avg_data_io_percent`|IOPS utilization for read and write physical IO. Provided for each database in the pool, as well as for the pool itself. There are different limits on the number of IOPS at the database level, and at the pool level, therefore monitoring this metric at both levels is recommended. Available in the [sys.dm_db_resource_stats](/sql/relational-databases/system-dynamic-management-views/sys-dm-db-resource-stats-azure-sql-database) view in every database, and in the [sys.elastic_pool_resource_stats](/sql/relational-databases/system-catalog-views/sys-elastic-pool-resource-stats-azure-sql-database) view in the `master` database. This metric is also emitted to Azure Monitor, where it is [named](../../azure-monitor/essentials/metrics-supported.md#microsoftsqlserverselasticpools) `physical_data_read_percent`, and can be viewed in Azure portal.|Below 80%. Occasional short spikes up to 100% may be acceptable.|
5757
|`avg_log_write_percent`|Throughput utilizations for transaction log write IO. Provided for each database in the pool, as well as for the pool itself. There are different limits on the log throughput at the database level, and at the pool level, therefore monitoring this metric at both levels is recommended. Available in the [sys.dm_db_resource_stats](/sql/relational-databases/system-dynamic-management-views/sys-dm-db-resource-stats-azure-sql-database) view in every database, and in the [sys.elastic_pool_resource_stats](/sql/relational-databases/system-catalog-views/sys-elastic-pool-resource-stats-azure-sql-database) view in the `master` database. This metric is also emitted to Azure Monitor, where it is [named](../../azure-monitor/essentials/metrics-supported.md#microsoftsqlserverselasticpools) `log_write_percent`, and can be viewed in Azure portal. When this metric is close to 100%, all database modifications (INSERT, UPDATE, DELETE, MERGE statements, SELECT … INTO, BULK INSERT, etc.) will be slower.|Below 90%. Occasional short spikes up to 100% may be acceptable.|
58-
|`oom_per_second`|The rate of out-of-memory (OOM) errors in an elastic pool, which is an indicator of memory pressure. Available in the [sys.dm_resource_governor_resource_pools_history_ex](/sql/relational-databases/system-dynamic-management-views/sys-dm-resource-governor-resource-pools-history-ex-azure-sql-database) view. See [Examples](#examples) for a sample query to calculate this metric. For more information, see resource limits for [elastic pools using DTUs](resource-limits-dtu-elastic-pools.md) or [elastic pools using vCores](resource-limits-vcore-elastic-pools.md), and [Troubleshoot out of memory errors with Azure SQL Database](troubleshoot-memory-errors-issues.md).|0|
58+
|`oom_per_second`|The rate of out-of-memory (OOM) errors in an elastic pool, which is an indicator of memory pressure. Available in the [sys.dm_resource_governor_resource_pools_history_ex](/sql/relational-databases/system-dynamic-management-views/sys-dm-resource-governor-resource-pools-history-ex-azure-sql-database) view. See [Examples](#examples) for a sample query to calculate this metric. For more information, see resource limits for [elastic pools using DTUs](resource-limits-dtu-elastic-pools.md) or [elastic pools using vCores](resource-limits-vcore-elastic-pools.md), and [Troubleshoot out of memory errors with Azure SQL Database](troubleshoot-memory-errors-issues.md). If you encounter out of memory errors, review [sys.dm_os_out_of_memory_events](/sql/relational-databases/system-dynamic-management-views/sys-dm-os-out-of-memory-events).|0|
5959
|`avg_storage_percent`|Total storage space used by data in all databases within an elastic pool. Does not include empty space in database files. Available in the [sys.elastic_pool_resource_stats](/sql/relational-databases/system-catalog-views/sys-elastic-pool-resource-stats-azure-sql-database) view in the `master` database. This metric is also emitted to Azure Monitor, where it is [named](../../azure-monitor/essentials/metrics-supported.md#microsoftsqlserverselasticpools) `storage_percent`, and can be viewed in Azure portal.|Below 80%. Can approach 100% for pools with no data growth.|
6060
|`avg_allocated_storage_percent`|Total storage space used by database files in storage in all databases within an elastic pool. Includes empty space in database files. Available in the [sys.elastic_pool_resource_stats](/sql/relational-databases/system-catalog-views/sys-elastic-pool-resource-stats-azure-sql-database) view in the `master` database. This metric is also emitted to Azure Monitor, where it is [named](../../azure-monitor/essentials/metrics-supported.md#microsoftsqlserverselasticpools) `allocated_data_storage_percent`, and can be viewed in Azure portal.|Below 90%. Can approach 100% for pools with no data growth.|
6161
|`tempdb_log_used_percent`|Transaction log space utilization in the `tempdb` database. Even though temporary objects created in one database are not visible in other databases in the same elastic pool, `tempdb` is a shared resource for all databases in the same pool. A long running or orphaned transaction in `tempdb` started from one database in the pool can consume a large portion of transaction log, and cause failures for queries in other databases in the same pool. Derived from [sys.dm_db_log_space_usage](/sql/relational-databases/system-dynamic-management-views/sys-dm-db-log-space-usage-transact-sql) and [sys.database_files](/sql/relational-databases/system-catalog-views/sys-database-files-transact-sql) views. This metric is also emitted to Azure Monitor, and can be viewed in Azure portal. See [Examples](#examples) for a sample query to return the current value of this metric.|Below 50%. Occasional spikes up to 80% are acceptable.|

0 commit comments

Comments
 (0)