Skip to content

Commit a2db48a

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ef87c30 + 7e196f3 commit a2db48a

File tree

46 files changed

+1132
-325
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+1132
-325
lines changed

articles/active-directory/saas-apps/facebook-work-accounts-provisioning-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The scenario outlined in this tutorial assumes that you already have the followi
4040
## Step 1. Plan your provisioning deployment
4141
1. Learn about [how the provisioning service works](../app-provisioning/user-provisioning.md).
4242
1. Determine who will be in [scope for provisioning](../app-provisioning/define-conditional-rules-for-provisioning-user-accounts.md).
43-
1. Determine what data to [map between Azure AD and Vonage](../app-provisioning/customize-application-attributes.md).
43+
1. Determine what data to [map between Azure AD and Facebook Work Accounts](../app-provisioning/customize-application-attributes.md).
4444

4545

4646
## Step 2. Add Facebook Work Accounts from the Azure AD application gallery

articles/active-directory/standards/configure-azure-active-directory-for-fedramp-high-impact.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following is a list of FedRAMP resources:
4242

4343
* [FedRAMP Security Assessment Framework](https://www.fedramp.gov/assets/resources/documents/FedRAMP_Security_Assessment_Framework.pdf)
4444

45-
* [Agency Guide for FedRAMP Authorizations](https://www.fedramp.gov/assets/resources/documents/Agency_Guide_for_Reuse_of_FedRAMP_Authorizations.pdf)
45+
* [Agency Guide for FedRAMP Authorizations](https://www.fedramp.gov/assets/resources/documents/Agency_Authorization_Playbook.pdf)
4646

4747
* [Managing compliance in the cloud at Microsoft](https://www.microsoft.com/trustcenter/common-controls-hub)
4848

articles/app-service/app-service-hybrid-connections.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: madsd
55

66
ms.assetid: 66774bde-13f5-45d0-9a70-4e9536a4f619
77
ms.topic: article
8-
ms.date: 05/05/2021
8+
ms.date: 2/10/2022
99
ms.author: madsd
1010
ms.custom: seodec18, fasttrack-edit
1111
---
@@ -140,7 +140,7 @@ To support the Hybrid Connections it's configured with, HCM requires:
140140

141141
- TCP access to Azure over port 443.
142142
- TCP access to the Hybrid Connection endpoint.
143-
- The ability to do DNS look-ups on the endpoint host and the Service Bus namespace.
143+
- The ability to do DNS look-ups on the endpoint host and the Service Bus namespace. In other words, the hostname in the Azure relay connection should be resolvable from the machine hosting the HCM.
144144

145145
> [!NOTE]
146146
> Azure Relay relies on Web Sockets for connectivity. This capability is only available on Windows Server 2012 or later. Because of that, HCM is not supported on anything earlier than Windows Server 2012.

articles/app-service/environment/migrate.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Migrate to App Service Environment v3 by using the migration feature
33
description: Overview of the migration feature for migration to App Service Environment v3
44
author: seligj95
55
ms.topic: article
6-
ms.date: 2/2/2022
6+
ms.date: 2/10/2022
77
ms.author: jordanselig
88
ms.custom: references_regions
99
---
@@ -21,7 +21,6 @@ At this time, App Service Environment migrations to v3 using the migration featu
2121

2222
- West Central US
2323
- Canada Central
24-
- Canada East
2524
- UK South
2625
- Germany West Central
2726
- East Asia

articles/automation/extension-based-hybrid-runbook-worker-install.md

Lines changed: 197 additions & 69 deletions
Large diffs are not rendered by default.

articles/azure-monitor/alerts/action-groups.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create and manage action groups in the Azure portal
33
description: Learn how to create and manage action groups in the Azure portal.
44
author: dkamstra
55
ms.topic: conceptual
6-
ms.date: 01/15/2022
6+
ms.date: 02/10/2022
77
ms.author: dukek
88
ms.custom: references_regions
99
---
@@ -182,10 +182,7 @@ While setting up *Email ARM Role*, you need to make sure below three conditions
182182
> [!NOTE]
183183
> It can take upto **24 hours** for customer to start receiving notifications after they add new ARM Role to their subscription.
184184
185-
### Event hub (preview)
186-
> [!NOTE]
187-
> The event hub action type is currently in *Preview*. During the preview there may be bugs and disruptions in availability of the functionality.
188-
185+
### Event Hub
189186
An event hub action publishes notifications to [Azure Event Hubs](~/articles/event-hubs/event-hubs-about.md). You may then subscribe to the alert notification stream from your event receiver.
190187

191188
### Function
@@ -207,7 +204,8 @@ You may have a limited number of Logic App actions in an Action Group.
207204
The Action Groups Secure Webhook action enables you to take advantage of Azure Active Directory to secure the connection between your action group and your protected web API (webhook endpoint). The overall workflow for taking advantage of this functionality is described below. For an overview of Azure AD Applications and service principals, see [Microsoft identity platform (v2.0) overview](../../active-directory/develop/v2-overview.md).
208205

209206
> [!NOTE]
210-
> Using the webhook action requires that the target webhook endpoint either doesn't require details of the alert to function successfully or it's capable of parsing the alert context information that's provided as part of the POST operation. If the webhook endpoint can't handle the alert context information on its own, you can use a solution like a [Logic App action](./action-groups-logic-app.md) for a custom manipulation of the alert context information to match the webhook's expected data format.
207+
> Using the webhook action requires that the target webhook endpoint be capable of processing the various JSON payloads emitted by different alert sources.
208+
> If the webhook endpoint is expecting a specific schema (for example Microsoft Teams) you should use the Logic App action to transform the alert schema to meet the target webhook's expectations.
211209
212210
1. Create an Azure AD Application for your protected web API. See [Protected web API: App registration](../../active-directory/develop/scenario-protected-web-api-app-registration.md).
213211
- Configure your protected API to be [called by a daemon app](../../active-directory/develop/scenario-protected-web-api-app-registration.md#if-your-web-api-is-called-by-a-daemon-app).
@@ -368,8 +366,8 @@ Pricing for supported countries/regions is listed in the [Azure Monitor pricing
368366
### Webhook
369367

370368
> [!NOTE]
371-
> Using the webhook action requires that the target webhook endpoint either doesn't require details of the alert to function successfully or it's capable of parsing the alert context information that's provided as part of the POST operation.
372-
> If the webhook endpoint can't handle the alert context information on its own, you can use a solution like a [Logic App action](./action-groups-logic-app.md) for a custom manipulation of the alert context information to match the webhook's expected data format.
369+
> Using the webhook action requires that the target webhook endpoint be capable of processing the various JSON payloads emitted by different alert sources.
370+
> If the webhook endpoint is expecting a specific schema (for example Microsoft Teams) you should use the Logic App action to transform the alert schema to meet the target webhook's expectations.
373371
374372
Webhooks are processed using the following rules
375373
- A webhook call is attempted a maximum of three times.

articles/azure-monitor/alerts/alerts-troubleshoot-metric.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Common issues with Azure Monitor metric alerts and possible solutio
44
author: harelbr
55
ms.author: harelbr
66
ms.topic: troubleshooting
7-
ms.date: 11/12/2021
7+
ms.date: 2/10/2022
88
---
99
# Troubleshooting problems in Azure Monitor metric alerts
1010

@@ -108,7 +108,7 @@ Metric alerts are stateful by default, and therefore additional alerts are not f
108108
- If you're creating the alert rule programmatically (for example, via [Resource Manager](./alerts-metric-create-templates.md), [PowerShell](/powershell/module/az.monitor/), [REST](/rest/api/monitor/metricalerts/createorupdate), [CLI](/cli/azure/monitor/metrics/alert)), set the *autoMitigate* property to 'False'.
109109
- If you're creating the alert rule via the Azure portal, uncheck the 'Automatically resolve alerts' option (available under the 'Alert rule details' section).
110110

111-
<sup>1</sup> For stateless metric alert rules, an alert will trigger only once every 10 minutes minimum, even if the frequency of evaluation is set to less than 10 minutes and the condition is still being met.
111+
<sup>1</sup> For stateless metric alert rules, an alert will trigger once every 5 minutes at a minimum, even if the frequency of evaluation is equal or less than 5 minutes and the condition is still being met.
112112

113113
> [!NOTE]
114114
> Making a metric alert rule stateless prevents fired alerts from becoming resolved, so even after the condition isn’t met anymore, the fired alerts will remain in a fired state until the 30 days retention period.

articles/azure-monitor/alerts/resource-manager-alerts-metric.md

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: bwren
55
ms.author: bwren
66
services: azure-monitor
77
ms.topic: sample
8-
ms.date: 05/18/2020
8+
ms.date: 02/10/2022
99
---
1010
# Resource Manager template samples for metric alert rules in Azure Monitor
1111

@@ -88,7 +88,6 @@ The following sample creates a metric alert rule using a single criteria and a s
8888
"defaultValue": "GreaterThan",
8989
"allowedValues": [
9090
"Equals",
91-
"NotEquals",
9291
"GreaterThan",
9392
"GreaterThanOrEqual",
9493
"LessThan",
@@ -804,7 +803,7 @@ For example, a few of the potential time series that are monitored by this alert
804803
}
805804
},
806805
"variables": {
807-
"criteria": "[array(parameters('criterion'))]"
806+
"criteria": "[array(parameters('criterion'))]"
808807
},
809808
"resources": [
810809
{
@@ -1161,7 +1160,6 @@ Save the json below as customstaticmetricalert.json for the purpose of this walk
11611160
"defaultValue": "GreaterThan",
11621161
"allowedValues": [
11631162
"Equals",
1164-
"NotEquals",
11651163
"GreaterThan",
11661164
"GreaterThanOrEqual",
11671165
"LessThan",
@@ -1450,7 +1448,7 @@ Save the json below as all-vms-in-resource-group-static.json for the purpose of
14501448
"type": "string",
14511449
"minLength": 1,
14521450
"metadata": {
1453-
"description": "Resource type of target resources to be monitored. Currently only supported resource type is Microsoft.Compute/virtualMachines"
1451+
"description": "Resource type of target resources to be monitored."
14541452
}
14551453
},
14561454
"metricName": {
@@ -1465,7 +1463,6 @@ Save the json below as all-vms-in-resource-group-static.json for the purpose of
14651463
"defaultValue": "GreaterThan",
14661464
"allowedValues": [
14671465
"Equals",
1468-
"NotEquals",
14691466
"GreaterThan",
14701467
"GreaterThanOrEqual",
14711468
"LessThan",
@@ -1737,7 +1734,7 @@ This sample creates a dynamic thresholds metric alert rule that monitors Percent
17371734
"type": "string",
17381735
"minLength": 1,
17391736
"metadata": {
1740-
"description": "Resource type of target resources to be monitored. Currently only supported resource type is Microsoft.Compute/virtualMachines"
1737+
"description": "Resource type of target resources to be monitored."
17411738
}
17421739
},
17431740
"metricName": {
@@ -2046,7 +2043,7 @@ This sample creates a static threshold metric alert rule that monitors Percentag
20462043
"type": "string",
20472044
"minLength": 1,
20482045
"metadata": {
2049-
"description": "Resource type of target resources to be monitored. Currently only supported resource type is Microsoft.Compute/virtualMachines"
2046+
"description": "Resource type of target resources to be monitored."
20502047
}
20512048
},
20522049
"metricName": {
@@ -2061,7 +2058,6 @@ This sample creates a static threshold metric alert rule that monitors Percentag
20612058
"defaultValue": "GreaterThan",
20622059
"allowedValues": [
20632060
"Equals",
2064-
"NotEquals",
20652061
"GreaterThan",
20662062
"GreaterThanOrEqual",
20672063
"LessThan",
@@ -2222,6 +2218,7 @@ This sample creates a static threshold metric alert rule that monitors Percentag
22222218
### Dynamic Thresholds alert on all virtual machines in a subscription
22232219
This sample creates a Dynamic Thresholds metric alert rule that monitors Percentage CPU for all virtual machines (in one Azure region) in a subscription.
22242220

2221+
### Template file
22252222

22262223
```json
22272224
{
@@ -2328,7 +2325,7 @@ This sample creates a Dynamic Thresholds metric alert rule that monitors Percent
23282325
"type": "string",
23292326
"minLength": 1,
23302327
"metadata": {
2331-
"description": "Resource type of target resources to be monitored. Currently only supported resource type is Microsoft.Compute/virtualMachines"
2328+
"description": "Resource type of target resources to be monitored."
23322329
}
23332330
},
23342331
"metricName": {
@@ -2527,7 +2524,8 @@ This sample creates a Dynamic Thresholds metric alert rule that monitors Percent
25272524
### Static threshold alert on a list of virtual machines
25282525
This sample creates a static threshold metric alert rule that monitors Percentage CPU for a list of virtual machines in one Azure region in a subscription.
25292526

2530-
### Parameter file
2527+
### Template file
2528+
25312529
```json
25322530
{
25332531
"$schema": "https://schema.management.azure.com/schemas/2015-01-01/deploymentTemplate.json#",
@@ -2633,7 +2631,7 @@ This sample creates a static threshold metric alert rule that monitors Percentag
26332631
"type": "string",
26342632
"minLength": 1,
26352633
"metadata": {
2636-
"description": "Resource type of target resources to be monitored. Currently only supported resource type is Microsoft.Compute/virtualMachines"
2634+
"description": "Resource type of target resources to be monitored."
26372635
}
26382636
},
26392637
"metricName": {
@@ -2648,7 +2646,6 @@ This sample creates a static threshold metric alert rule that monitors Percentag
26482646
"defaultValue": "GreaterThan",
26492647
"allowedValues": [
26502648
"Equals",
2651-
"NotEquals",
26522649
"GreaterThan",
26532650
"GreaterThanOrEqual",
26542651
"LessThan",
@@ -2813,7 +2810,7 @@ This sample creates a static threshold metric alert rule that monitors Percentag
28132810
### Dynamic Thresholds alert on a list of virtual machines
28142811
This sample creates a dynamic thresholds metric alert rule that monitors Percentage CPU for a list of virtual machines in one Azure region in a subscription.
28152812

2816-
### Parameter file
2813+
### Template file
28172814

28182815
```json
28192816
{
@@ -2920,7 +2917,7 @@ This sample creates a dynamic thresholds metric alert rule that monitors Percent
29202917
"type": "string",
29212918
"minLength": 1,
29222919
"metadata": {
2923-
"description": "Resource type of target resources to be monitored. Currently only supported resource type is Microsoft.Compute/virtualMachines"
2920+
"description": "Resource type of target resources to be monitored."
29242921
}
29252922
},
29262923
"metricName": {
@@ -3209,7 +3206,6 @@ This sample creates a dynamic thresholds metric alert rule that monitors Percent
32093206
],
32103207
"evaluationFrequency": "PT1M",
32113208
"windowSize": "PT5M",
3212-
"templateType": 0,
32133209
"criteria": {
32143210
"odata.type": "Microsoft.Azure.Monitor.WebtestLocationAvailabilityCriteria",
32153211
"webTestId": "[resourceId('Microsoft.Insights/webtests', variables('pingTestName'))]",
@@ -3297,4 +3293,4 @@ Additional configuration of the content-match `pingText` parameter is controlled
32973293

32983294
- [Get other sample templates for Azure Monitor](../resource-manager-samples.md).
32993295
- [Learn more about alerts](./alerts-overview.md).
3300-
- [Get a sample to create an action group with Resource Manager template](resource-manager-action-groups.md)
3296+
- [Get a sample to create an action group with Resource Manager template](resource-manager-action-groups.md)

articles/azure-monitor/app/annotations.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ You can use the CreateReleaseAnnotation PowerShell script to create annotations
9393
Id = [GUID]::NewGuid();
9494
AnnotationName = $releaseName;
9595
EventTime = (Get-Date).ToUniversalTime().GetDateTimeFormats("s")[0];
96-
Category = "Deployment";
96+
Category = "Deployment"; #Application Insights only displays annotations from the "Deployment" Category
9797
Properties = ConvertTo-Json $releaseProperties -Compress
9898
}
9999
@@ -104,6 +104,9 @@ You can use the CreateReleaseAnnotation PowerShell script to create annotations
104104
# Invoke-AzRestMethod -Path "$aiResourceId/Annotations?api-version=2015-05-01" -Method PUT -Payload $body
105105
```
106106
107+
[!NOTE]
108+
Your annotations must have **Category** set to **Deployment** in order to be displayed in the Azure Portal.
109+
107110
3. Call the PowerShell script with the following code, replacing the angle-bracketed placeholders with your values. The -releaseProperties are optional.
108111
109112
```powershell
@@ -155,6 +158,9 @@ Select any annotation marker to open details about the release, including reques
155158
156159
Release annotations are a feature of the cloud-based Azure Pipelines service of Azure DevOps.
157160
161+
> [!IMPORTANT]
162+
> Annotations using API keys is deprecated. We recommend using [Azure CLI](https://docs.microsoft.com/azure/azure-monitor/app/annotations#create-release-annotations-with-azure-cli) instead.
163+
158164
### Install the annotations extension (one time)
159165
160166
To be able to create release annotations, you'll need to install one of the many Azure DevOps extensions available in the Visual Studio Marketplace.

articles/azure-monitor/logs/data-collector-api.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -381,6 +381,13 @@ namespace OIAPIExample
381381
```
382382

383383
### Python sample
384+
385+
>[!NOTE]
386+
> If using Python 2, you may need to change the line:
387+
> `bytes_to_hash = bytes(string_to_hash, encoding="utf-8")`
388+
> to
389+
> `bytes_to_hash = bytes(string_to_hash).encode("utf-8")`
390+
384391
```python
385392
import json
386393
import requests

0 commit comments

Comments
 (0)