You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/aks/deploy-marketplace.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ az provider register --namespace Microsoft.KubernetesConfiguration --wait
40
40
41
41
## Select and deploy a Kubernetes offer
42
42
43
-
1. In the [Azure portal](https://ms.portal.azure.com/), search for **Marketplace** on the top search bar. In the results, under **Services**, select **Marketplace**.
43
+
1. In the [Azure portal](https://portal.azure.com/), search for **Marketplace** on the top search bar. In the results, under **Services**, select **Marketplace**.
44
44
45
45
1. You can search for an offer or publisher directly by name, or you can browse all offers. To find Kubernetes application offers, use the **Product Type** filter for **Azure Containers**.
Copy file name to clipboardExpand all lines: articles/app-service/quickstart-wordpress.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ To complete this quickstart, you need an Azure account with an active subscripti
25
25
26
26
## Create WordPress site using Azure portal
27
27
28
-
1. To start creating the WordPress site, browse to [https://ms.portal.azure.com/#create/WordPress.WordPress](https://ms.portal.azure.com/#create/WordPress.WordPress).
28
+
1. To start creating the WordPress site, browse to [https://portal.azure.com/#create/WordPress.WordPress](https://portal.azure.com/#create/WordPress.WordPress).
29
29
30
30
:::image type="content" source="./media/quickstart-wordpress/01-portal-create-wordpress-on-app-service.png?text=WordPress from Azure Marketplace" alt-text="Screenshot of Create a WordPress site.":::
Copy file name to clipboardExpand all lines: articles/azure-arc/servers/concept-log-analytics-extension-deployment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ This method supports managing the installation, management, and removal of VM ex
40
40
41
41
### Use Azure Policy
42
42
43
-
You can use Azure Policy to deploy the Azure Monitor agent VM extension at-scale to machines in your environment, and maintain configuration compliance. This is accomplished by using either the [**Configure Linux Arc-enabled machines to run Azure Monitor Agent**](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F845857af-0333-4c5d-bbbc-6076697da122) or the [**Configure Windows Arc-enabled machines to run Azure Monitor Agent**](https://ms.portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F94f686d6-9a24-4e19-91f1-de937dc171a4) policy definition.
43
+
You can use Azure Policy to deploy the Azure Monitor agent VM extension at-scale to machines in your environment, and maintain configuration compliance. This is accomplished by using either the [**Configure Linux Arc-enabled machines to run Azure Monitor Agent**](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F845857af-0333-4c5d-bbbc-6076697da122) or the [**Configure Windows Arc-enabled machines to run Azure Monitor Agent**](https://portal.azure.com/#view/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F94f686d6-9a24-4e19-91f1-de937dc171a4) policy definition.
44
44
45
45
Azure Policy includes several prebuilt definitions related to Azure Monitor. For a complete list of the built-in policies in the **Monitoring** category, see [Azure Policy built-in definitions for Azure Monitor](../../azure-monitor/policy-reference.md).
Copy file name to clipboardExpand all lines: articles/azure-monitor/insights/insights-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ Some visualizations are considered part of Azure Monitor and follow the support
17
17
18
18
## Insights and curated visualizations
19
19
20
-
The following table lists the available curated visualizations and information about them. **Most** of the list below can be found in the [Insights hub in the Azure portal](https://ms.portal.azure.com/#view/Microsoft_Azure_Monitoring/AzureMonitoringBrowseBlade/~/more). The table uses the same grouping as portal.
20
+
The following table lists the available curated visualizations and information about them. **Most** of the list below can be found in the [Insights hub in the Azure portal](https://portal.azure.com/#view/Microsoft_Azure_Monitoring/AzureMonitoringBrowseBlade/~/more). The table uses the same grouping as portal.
21
21
22
22
>[!NOTE]
23
23
> Another type of older visualization called *monitoring solutions* is no longer in active development. The replacement technology is the Azure Monitor Insights, as mentioned here. We suggest you use the Insights and not deploy new instances of solutions. For more information on the solutions, see [Monitoring solutions in Azure Monitor](solutions.md).
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/manage-access.md
+10-21Lines changed: 10 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ The factors that define the data you can access are described in the following t
29
29
|[Access mode](#access-mode)| Method used to access the workspace. Defines the scope of the data available and the access control mode that's applied. |
30
30
|[Access control mode](#access-control-mode)| Setting on the workspace that defines whether permissions are applied at the workspace or resource level. |
31
31
|[Azure role-based access control (RBAC)](#azure-rbac)| Permissions applied to individuals or groups of users for the workspace or resource sending data to the workspace. Defines what data you have access to. |
32
-
|[Table-level Azure RBAC](#set-table-level-read-access)| Optional permissions that define specific data types in the workspace that you can access. Apply to all users no matter your access mode or access control mode. |
32
+
|[Table-level Azure RBAC](#set-table-level-read-access-preview)| Optional permissions that define specific data types in the workspace that you can access. Apply to all users no matter your access mode or access control mode. |
33
33
34
34
## Access mode
35
35
@@ -56,14 +56,14 @@ The following table summarizes the access modes:
56
56
|:---|:---|:---|
57
57
| Who is each model intended for? | Central administration.<br>Administrators who need to configure data collection and users who need access to a wide variety of resources. Also currently required for users who need to access logs for resources outside of Azure. | Application teams.<br>Administrators of Azure resources being monitored. Allows them to focus on their resource without filtering. |
58
58
| What does a user require to view logs? | Permissions to the workspace.<br>See "Workspace permissions" in [Manage access using workspace permissions](./manage-access.md#azure-rbac). | Read access to the resource.<br>See "Resource permissions" in [Manage access using Azure permissions](./manage-access.md#azure-rbac). Permissions can be inherited from the resource group or subscription or directly assigned to the resource. Permission to the logs for the resource will be automatically assigned. The user doesn't require access to the workspace.|
59
-
| What is the scope of permissions? | Workspace.<br>Users with access to the workspace can query all logs in the workspace from tables they have permissions to. See [Set table-level read access](./manage-access.md#set-table-level-read-access). | Azure resource.<br>Users can query logs for specific resources, resource groups, or subscriptions they have access to in any workspace, but they can't query logs for other resources. |
59
+
| What is the scope of permissions? | Workspace.<br>Users with access to the workspace can query all logs in the workspace from tables they have permissions to. See [Set table-level read access](./manage-access.md#set-table-level-read-access-preview). | Azure resource.<br>Users can query logs for specific resources, resource groups, or subscriptions they have access to in any workspace, but they can't query logs for other resources. |
60
60
| How can a user access logs? | On the **Azure Monitor** menu, select **Logs**.<br><br>Select **Logs** from **Log Analytics workspaces**.<br><br>From Azure Monitor [workbooks](../best-practices-analysis.md#workbooks). | Select **Logs** on the menu for the Azure resource. Users will have access to data for that resource.<br><br>Select **Logs** on the **Azure Monitor** menu. Users will have access to data for all resources they have access to.<br><br>Select **Logs** from **Log Analytics workspaces**. Users will have access to data for all resources they have access to.<br><br>From Azure Monitor [workbooks](../best-practices-analysis.md#workbooks). |
61
61
62
62
## Access control mode
63
63
64
64
The *access control mode* is a setting on each workspace that defines how permissions are determined for the workspace.
65
65
66
-
***Require workspace permissions**. This control mode doesn't allow granular Azure RBAC. To access the workspace, the user must be [granted permissions to the workspace](#azure-rbac) or to [specific tables](#set-table-level-read-access).
66
+
***Require workspace permissions**. This control mode doesn't allow granular Azure RBAC. To access the workspace, the user must be [granted permissions to the workspace](#azure-rbac) or to [specific tables](#set-table-level-read-access-preview).
67
67
68
68
If a user accesses the workspace in [workspace-context mode](#access-mode), they have access to all data in any table they've been granted access to. If a user accesses the workspace in [resource-context mode](#access-mode), they have access to only data for that resource in any table they've been granted access to.
69
69
@@ -276,11 +276,11 @@ Grant a user access to log data from their resources and read all Azure AD sign-
276
276
-`Microsoft.OperationalInsights/workspaces/query/ComputerGroup/read`: Required to be able to use Update Management solutions
277
277
- Grant users the following permissions to their resources: `*/read`, assigned to the Reader role, or `Microsoft.Insights/logs/*/read`
278
278
279
-
## Set table-level read access
279
+
## Set table-level read access (preview)
280
280
281
281
To create a [custom role](../../role-based-access-control/custom-roles.md) that lets specific users or groups read data from specific tables in a workspace:
282
282
283
-
1. Create a custom role that grants read access to table data, based on the built-in Azure Monitor Logs **Reader** role:
283
+
1. Create a custom role that grants users permission to execute queries in the Log Analytics workspace, based on the built-in Azure Monitor Logs **Reader** role:
284
284
285
285
1. Navigate to your workspace and select **Access control (AIM)** > **Roles**.
286
286
@@ -290,7 +290,7 @@ To create a [custom role](../../role-based-access-control/custom-roles.md) that
290
290
291
291
This opens the **Create a custom role** screen.
292
292
293
-
1. On the **Basics** tab of the screen enter a **Custom role name** value and, optionally, provide a description.
293
+
1. On the **Basics** tab of the screen, enter a **Custom role name** value and, optionally, provide a description.
294
294
295
295
:::image type="content" source="media/manage-access/manage-access-create-custom-role.png" alt-text="Screenshot that shows the Basics tab of the Create a custom role screen with the Custom role name and Description fields highlighted." lightbox="media/manage-access/manage-access-create-custom-role.png":::
296
296
@@ -299,17 +299,6 @@ To create a [custom role](../../role-based-access-control/custom-roles.md) that
299
299
:::image type="content" source="media/manage-access/manage-access-create-custom-role-json.png" alt-text="Screenshot that shows the JSON tab of the Create a custom role screen with the actions section of the JSON file highlighted." lightbox="media/manage-access/manage-access-create-custom-role-json.png":::
300
300
301
301
1. Select **Review + Create** at the bottom of the screen, and then **Create** on the next page.
302
-
1. Copy the custom role ID:
303
-
1. Select **Access control (AIM)** > **Roles**.
304
-
1. Right-click on your custom role and select **Edit**.
305
-
306
-
This opens the **Custom Role** screen.
307
-
308
-
:::image type="content" source="media/manage-access/manage-access-role-definition-id.png" alt-text="Screenshot that shows the JSON tab of the Custom Role screen with the ID field highlighted." lightbox="media/manage-access/manage-access-role-definition-id.png":::
309
-
310
-
1. Select **JSON** and copy the `id` field.
311
-
312
-
You'll need the `/providers/Microsoft.Authorization/roleDefinitions/<definition_id>` value when you call the `https://management.azure.com/batch?api-version=2020-06-01` POST API.
313
302
314
303
1. Assign your custom role to the relevant users or groups:
315
304
1. Select **Access control (AIM)** > **Add** > **Add role assignment**.
@@ -339,9 +328,9 @@ To create a [custom role](../../role-based-access-control/custom-roles.md) that
@@ -360,15 +349,15 @@ To create a [custom role](../../role-based-access-control/custom-roles.md) that
360
349
361
350
Where:
362
351
- You can generate a GUID for `<GUID 1>` and `<GUID 2>` using any GUID generator.
363
-
- `<custom_role_ID>` is the `/providers/Microsoft.Authorization/roleDefinitions/<definition_id>` value you copied earlier.
352
+
- `<user_object_ID>` is the object ID of the user to which you want to grant table read access.
364
353
- `<subscription_ID>` is the ID of the subscription related to the workspace.
365
354
- `<resource_group_name>` is the resource group of the workspace.
366
355
- `<workspace_name>` is the name of the workspace.
367
356
- `<table_name>` is the name of the table to which you want to assign the user or group permission to read data from.
368
357
369
358
### Legacy method of setting table-level read access
370
359
371
-
[Azure custom roles](../../role-based-access-control/custom-roles.md) let you grant access to specific tables in the workspace, although we recommend defining [table-level read access](#set-table-level-read-access) as described above.
360
+
[Azure custom roles](../../role-based-access-control/custom-roles.md) let you grant access to specific tables in the workspace, although we recommend defining [table-level read access](#set-table-level-read-access-preview) as described above.
372
361
373
362
Azure custom roles apply to workspaces with either workspace-context or resource-context [access control modes](#access-control-mode) regardless of the user's [access mode](#access-mode).
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/workspace-design.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ When you grant a user [access to a workspace](manage-access.md#azure-rbac), the
105
105
-**If you want users to be able to access data for their resources:** Keep the default access control mode of **Use resource or workspace permissions**.
106
106
-**If you want to explicitly assign permissions for all users:** Change the access control mode to **Require workspace permissions**.
107
107
108
-
[Table-level RBAC](manage-access.md#set-table-level-read-access): With table-level RBAC, you can grant or deny access to specific tables in the workspace. In this way, you can implement granular permissions required for specific situations in your environment.
108
+
[Table-level RBAC](manage-access.md#set-table-level-read-access-preview): With table-level RBAC, you can grant or deny access to specific tables in the workspace. In this way, you can implement granular permissions required for specific situations in your environment.
109
109
110
110
For example, you might grant access to only specific tables collected by Microsoft Sentinel to an internal auditing team. Or you might deny access to security-related tables to resource owners who need operational data related to their resources.
Copy file name to clipboardExpand all lines: articles/azure-monitor/monitor-reference.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,9 +20,9 @@ For a list of Azure resource provider namespaces, see [Resource providers for Az
20
20
For a list of resource providers that support Azure Monitor
21
21
22
22
-**Metrics** - See [Supported metrics in Azure Monitor](essentials/metrics-supported.md).
23
-
-**Metric alerts** - See [Supported resources for metric alerts in Azure Monitor](/alerts/alerts-metric-near-real-time.md).
24
-
-**Prometheus metrics** - See [TBD](essentials/FILL ME IN.md).
25
-
-**Resource logs** - See [Supported categories for Azure Monitor resource logs](/essentials/resource-logs-categories.md).
23
+
-**Metric alerts** - See [Supported resources for metric alerts in Azure Monitor](alerts/alerts-metric-near-real-time.md).
24
+
-**Prometheus metrics** - See [Prometheus metrics overview](essentials/prometheus-metrics-overview.md#enable).
25
+
-**Resource logs** - See [Supported categories for Azure Monitor resource logs](essentials/resource-logs-categories.md).
26
26
-**Activity log** - All entries in the activity log are available for query, alerting and routing to Azure Monitor Logs store regardless of resource provider.
Copy file name to clipboardExpand all lines: articles/azure-video-indexer/logic-apps-connector-arm-accounts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ The following image shows the first flow:
44
44
45
45

46
46
47
-
1. Create the [Logic App](https://ms.portal.azure.com/#create/Microsoft.LogicApp). We create a Logic App in the same region as the Azure Video Indexer region (recommended but not required). We call the logic app `UploadIndexVideosApp`.
47
+
1. Create the [Logic App](https://portal.azure.com/#create/Microsoft.LogicApp). We create a Logic App in the same region as the Azure Video Indexer region (recommended but not required). We call the logic app `UploadIndexVideosApp`.
0 commit comments