You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> When using a custom attribute in custom policies, you must prefix the claim type ID with `extension_` to allow the correct data mapping to take place within the Azure AD B2C directory.
151
+
149
152
The following example demonstrates the use of custom attributes in an Azure AD B2C custom policy claim definition.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-faq.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -143,7 +143,7 @@ sections:
143
143
- question: |
144
144
Are single label domains (SLDs) supported?
145
145
answer: |
146
-
While we strongly recommend against this network configuration ([see article](https://support.microsoft.com/help/2269810/microsoft-support-for-single-label-domains)), using Azure AD Connect sync with a single label domain is supported, as long as the network configuration for the single level domain is functioning correctly.
146
+
While we strongly recommend against this network configuration ([see article](https://support.microsoft.com/help/2269810/microsoft-support-for-single-label-domains)), using Azure AD Connect sync with a single label domain is supported, as long as the network configuration for the single level domain is functioning correctly. In SLD scenarios where the Active Directory NetBIOS domain name differs from the FQDN domain name, it's unsupported to install Azure AD Connect.
Copy file name to clipboardExpand all lines: articles/aks/command-invoke.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ az aks command invoke \
51
51
52
52
The above example runs three `helm` commands on the *myAKSCluster* cluster in *myResourceGroup*.
53
53
54
-
## Use `command invoke` to run commands an with attached file or directory
54
+
## Use `command invoke` to run commands with an attached file or directory
55
55
56
56
Use `az aks command invoke --command` to run commands on your cluster and `--file` to attach a file or directory for use by those commands. For example:
Copy file name to clipboardExpand all lines: articles/aks/use-psa.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,8 @@ ms.date: 08/08/2022
11
11
12
12
Pod Security Admission enforces Pod Security Standards policies on pods running in a namespace. Pod Security Admission is enabled by default in AKS and is controlled by adding labels to a namespace. For more information about Pod Security Admission, see [Enforce Pod Security Standards with Namespace Labels][kubernetes-psa]. For more information about the Pod Security Standards used by Pod Security Admission, see [Pod Security Standards][kubernetes-pss].
13
13
14
+
Pod Security Admission is a built-in policy solution for single cluster implementations. If you are looking for enterprise-grade policy, then [Azure policy](use-azure-policy.md) is a better choice.
15
+
14
16
## Before you begin
15
17
16
18
- An Azure subscription. If you don't have an Azure subscription, you can create a [free account](https://azure.microsoft.com/free).
Copy file name to clipboardExpand all lines: articles/availability-zones/az-region.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn what services are supported by availability zones and underst
4
4
author: awysza
5
5
ms.service: azure
6
6
ms.topic: conceptual
7
-
ms.date: 06/21/2022
7
+
ms.date: 08/18/2022
8
8
ms.author: rarco
9
9
ms.reviewer: cynthn
10
10
ms.custom: references_regions
@@ -56,6 +56,7 @@ In the Product Catalog, always-available services are listed as "non-regional" s
56
56
|[Azure Backup](migrate-recovery-services-vault.md)||
57
57
|[Azure Cosmos DB](../cosmos-db/high-availability.md)||
58
58
|[Azure DNS: Azure DNS Private Zones](../dns/private-dns-getstarted-portal.md)||
59
+
|[Azure DNS: Azure DNS Private Resolver](../dns/dns-private-resolver-get-started-portal.md)||
59
60
|[Azure ExpressRoute](../expressroute/designing-for-high-availability-with-expressroute.md)||
60
61
|[Azure Public IP](../virtual-network/ip-services/public-ip-addresses.md)||
61
62
|[Azure Site Recovery](migrate-recovery-services-vault.md)||
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/data-collection-rule-azure-monitor-agent.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,15 +29,15 @@ To send data to Log Analytics, create the data collection rule in the **same reg
29
29
1. From the **Monitor** menu, select **Data Collection Rules**.
30
30
1. Select **Create** to create a new Data Collection Rule and associations.
31
31
32
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rules-updated.png#lightbox)
32
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rules-updated.png#lightbox)
33
33
34
34
1. Provide a **Rule name** and specify a **Subscription**, **Resource Group**, **Region**, and **Platform Type**.
35
35
36
36
**Region** specifies where the DCR will be created. The virtual machines and their associations can be in any subscription or resource group in the tenant.
37
37
38
38
**Platform Type** specifies the type of resources this rule can apply to. Custom allows for both Windows and Linux types.
39
39
40
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-basics-updated.png#lightbox)
40
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-basics-updated.png#lightbox)
41
41
42
42
1. On the **Resources** tab, add the resources (virtual machines, virtual machine scale sets, Arc for servers) to which to associate the data collection rule. The portal will install Azure Monitor Agent on resources that don't already have it installed, and will also enable Azure Managed Identity.
43
43
@@ -46,23 +46,24 @@ To send data to Log Analytics, create the data collection rule in the **same reg
46
46
47
47
If you need network isolation using private links, select existing endpoints from the same region for the respective resources, or [create a new endpoint](../essentials/data-collection-endpoint-overview.md).
48
48
49
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png#lightbox)
49
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png#lightbox)
50
+
50
51
51
52
1. On the **Collect and deliver** tab, select **Add data source** to add a data source and set a destination.
52
53
1. Select a **Data source type**.
53
54
1. Select which data you want to collect. For performance counters, you can select from a predefined set of objects and their sampling rate. For events, you can select from a set of logs and severity levels.
54
55
55
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-data-source-basic-updated.png#lightbox)
56
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-data-source-basic-updated.png#lightbox)
56
57
57
58
1. Select **Custom** to collect logs and performance counters that are not [currently supported data sources](azure-monitor-agent-overview.md#data-sources-and-destinations) or to [filter events using XPath queries](#filter-events-using-xpath-queries). You can then specify an [XPath](https://www.w3schools.com/xml/xpath_syntax.asp) to collect any specific values. See [Sample DCR](data-collection-rule-sample-agent.md) for an example.
58
59
59
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-data-source-custom-updated.png#lightbox)
60
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-data-source-custom-updated.png#lightbox)
60
61
61
62
1. On the **Destination** tab, add one or more destinations for the data source. You can select multiple destinations of the same or different types - for instance multiple Log Analytics workspaces (known as "multi-homing").
62
63
63
64
You can send Windows event and Syslog data sources can to Azure Monitor Logs only. You can send performance counters to both Azure Monitor Metrics and Azure Monitor Logs.
64
65
65
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-destination.png#lightbox)
66
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-destination.png#lightbox)
66
67
67
68
1. Select **Add Data Source** and then **Review + create** to review the details of the data collection rule and association with the set of virtual machines.
68
69
1. Select **Create** to create the data collection rule.
@@ -117,7 +118,7 @@ In Windows, you can use Event Viewer to extract XPath queries as shown below.
117
118
118
119
When you paste the XPath query into the field on the **Add data source** screen, (step 5 in the picture below), you must append the log type category followed by '!'.
119
120
120
-
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-extract-xpath.png#lightbox)
121
+
[](media/data-collection-rule-azure-monitor-agent/data-collection-rule-extract-xpath.png#lightbox)
121
122
122
123
See [XPath 1.0 limitations](/windows/win32/wes/consuming-events#xpath-10-limitations) for a list of limitations in the XPath supported by Windows event log.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/java-spring-boot.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,14 +48,17 @@ To use the programmatic configuration and attach the Application Insights agent
48
48
49
49
And invoke the `attach()` method of the `com.microsoft.applicationinsights.attach.ApplicationInsights` class.
50
50
51
-
> [!TIP]
52
-
> ⚠ JRE is not supported.
51
+
> [!WARNING]
52
+
>
53
+
> JRE is not supported.
53
54
54
-
> [!TIP]
55
-
> ⚠ Read-only file system is not supported.
55
+
> [!WARNING]
56
+
>
57
+
> Read-only file system is not supported.
56
58
57
-
> [!TIP]
58
-
> ⚠ The invocation must be requested at the beginning of the `main` method.
59
+
> [!WARNING]
60
+
>
61
+
> The invocation must be requested at the beginning of the `main` method.
59
62
60
63
Example:
61
64
@@ -72,7 +75,7 @@ public class SpringBootApp {
72
75
73
76
If you want to use a JSON configuration:
74
77
* The `applicationinsights.json` file has to be in the classpath
75
-
* Or you can use an environmental variable or a system property, more in the _Configuration file path_ part on [this page](../app/java-standalone-config.md).
78
+
* Or you can use an environmental variable or a system property, more in the _Configuration file path_ part on [this page](../app/java-standalone-config.md). Spring properties defined in a Spring _.properties_ file are not supported.
0 commit comments