Skip to content

Commit b868304

Browse files
authored
Merge pull request #260591 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 35bf4a6 + 532653d commit b868304

File tree

55 files changed

+134
-228
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+134
-228
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6463,6 +6463,11 @@
64636463
"source_path_from_root": "/articles/azure-monitor/logs/resource-expression.md",
64646464
"redirect_url": "/azure/azure-monitor/logs/cross-workspace-query",
64656465
"redirect_document_id": false
6466+
},
6467+
{
6468+
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-configure-workspace.md",
6469+
"redirect_url": "/azure/azure-monitor/vm/vminsights-enable-overview",
6470+
"redirect_document_id": false
64666471
}
64676472
]
64686473
}

articles/active-directory-b2c/configure-tokens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ You can configure the token lifetime, including:
2828

2929
- **Access and ID token lifetimes (minutes)** - The lifetime of the OAuth 2.0 bearer token and ID tokens. The default is 60 minutes (1 hour). The minimum (inclusive) is 5 minutes. The maximum (inclusive) is 1,440 minutes (24 hours).
3030
- **Refresh token lifetime (days)** - The maximum time period before which a refresh token can be used to acquire a new access token, if your application had been granted the `offline_access` scope. The default is 14 days. The minimum (inclusive) is one day. The maximum (inclusive) 90 days.
31-
- **Refresh token sliding window lifetime** - The refresh token sliding window type. `Bounded` indicates that the refresh token can be extended as specify in the **Lifetime length (days)**. `No expiry` indicates that the refresh token sliding window lifetime never expires.
31+
- **Refresh token sliding window lifetime** - The refresh token sliding window type. `Bounded` indicates that the refresh token can be extended as specified in the **Lifetime length (days)**. `No expiry` indicates that the refresh token sliding window lifetime never expires.
3232
- **Lifetime length (days)** - After this time period elapses the user is forced to reauthenticate, irrespective of the validity period of the most recent refresh token acquired by the application. The value must be greater than or equal to the **Refresh token lifetime** value.
3333

3434
The following diagram shows the refresh token sliding window lifetime behavior.

articles/ai-studio/how-to/prompt-flow-tools/python-tool.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ from promptflow import tool
133133
from promptflow.connections import CustomConnection
134134

135135
@tool
136-
def my_python_tool(message:str, myconn:CustomConnection) -> str:
136+
def my_python_tool(message: str, myconn: CustomConnection) -> str:
137137
# Get authentication key-values from the custom connection
138138
connection_key1_value = myconn.key1
139139
connection_key2_value = myconn.key2

articles/azure-monitor/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -408,8 +408,6 @@ items:
408408
href: vm/vminsights-enable-hybrid.md
409409
- name: Dependency Agent
410410
href: vm/vminsights-dependency-agent-maintenance.md
411-
- name: Configure workspace
412-
href: vm/vminsights-configure-workspace.md
413411
- name: Migrate from deprecated VM insights policies
414412
href: vm/vminsights-migrate-deprecated-policies.md
415413
- name: Map dependencies

articles/azure-monitor/vm/vminsights-configure-workspace.md

Lines changed: 0 additions & 104 deletions
This file was deleted.

articles/azure-monitor/vm/vminsights-enable-hybrid.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ To enable hybrid VMs, first enable [Azure Arc for servers](../../azure-arc/serve
1717

1818
## Prerequisites
1919

20-
- [Create and configure a Log Analytics workspace](./vminsights-configure-workspace.md).
20+
- [Create a Log Analytics workspace](../logs/quick-create-workspace.md).
2121
- See [Supported operating systems](./vminsights-enable-overview.md#supported-operating-systems) to ensure that the operating system of the virtual machine or virtual machine scale set you're enabling is supported.
2222

2323
## Overview

articles/azure-monitor/vm/vminsights-enable-overview.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,9 @@ This article provides an overview of how to enable VM insights to monitor the he
2020
- On-premises virtual machines.
2121
- Virtual machines hosted in another cloud environment.
2222

23+
> [!NOTE]
24+
> Configuring a Log Analytics workspace for using VM insights by using the Log Analytics agent is no longer supported.
25+
2326
## Installation options and supported machines
2427

2528
The following table shows the installation methods available for enabling VM insights on supported machines.
@@ -120,8 +123,6 @@ If you associate a data collection rule with the Map feature enabled to a machin
120123
121124
- You must remove the Log Analytics agent yourself from any machines that are using it. Before you do this step, ensure that the machine isn't relying on any other solutions that require the Log Analytics agent. For more information, see [Migrate to Azure Monitor Agent from Log Analytics agent](../agents/azure-monitor-agent-migration.md).
122125

123-
- After you verify that no Log Analytics agents are still connected to your Log Analytics workspace, you can [remove the VM Insights solution from the workspace](vminsights-configure-workspace.md#remove-the-vminsights-solution-from-a-workspace). It's no longer needed.
124-
125126
> [!NOTE]
126127
> To check if you have any machines with both agents sending data to your Log Analytics workspace, run the following [log query](../logs/log-query-overview.md) in [Log Analytics](../logs/log-analytics-overview.md). This query will show the last heartbeat for each computer. If a computer has both agents, it will return two records, each with a different `category`. The Azure Monitor agent will have a `category` of *Azure Monitor Agent*. The Log Analytics agent will have a `category` of *Direct Agent*.
127128
>

articles/azure-monitor/vm/vminsights-enable-policy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,6 @@ To assign a VM insights policy initiative to a subscription or management group
5656
1. (Optional) Change the **Assignment name** and add a **Description**.
5757
1. On the **Parameters** tab, select a **Log Analytics workspace** to which all virtual machines in the assignment will send data. For virtual machines to send data to different workspaces, create multiple assignments, each with their own scope.
5858

59-
If you're assigning a legacy initiative, the workspace must have the *VMInsights* solution installed, as described in [Configure Log Analytics workspace for VM insights](vminsights-configure-workspace.md).
60-
6159
:::image type="content" source="media/vminsights-enable-policy/assignment-workspace.png" lightbox="media/vminsights-enable-policy/assignment-workspace.png" alt-text="Screenshot that shows a workspace.":::
6260

6361
> [!NOTE]

0 commit comments

Comments
 (0)