Skip to content

Commit ce68122

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into egridehub11118
2 parents f140c1e + 7f9c21e commit ce68122

File tree

46 files changed

+1075
-181
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+1075
-181
lines changed

articles/active-directory/reports-monitoring/reference-audit-activities.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -369,6 +369,7 @@ This article lists the audit activities that can be logged in your audit logs.
369369
|Application Management|AdminUserJourneys-GetResources|
370370
|Directory Management|AdminUserJourneys-RemoveResources|
371371
|Directory Management|AdminUserJourneys-SetResources|
372+
|Directory Management|Create company|
372373
|Directory Management|Create IdentityProvider|
373374
|Directory Management|Create a new AdminUserJourney|
374375
|Directory Management|Create localized resource json|

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

Lines changed: 36 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/31/2021
12+
ms.date: 11/14/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Implement federated authentication between Azure Active Directory and SharePoint on-premises
@@ -343,4 +343,38 @@ $t.Update()
343343

344344
1. In the section **Reply URL (Assertion Consumer Service URL)**, add the URL (for example, `https://otherwebapp.contoso.local/`) of all additional web applications that need to sign in users with Azure Active Directory and click **Save**.
345345

346-
![Specify additional web applications](./media/sharepoint-on-premises-tutorial/azure-active-directory-app-reply-urls.png)
346+
![Specify additional web applications](./media/sharepoint-on-premises-tutorial/azure-active-directory-app-reply-urls.png)
347+
348+
### Configure the lifetime of the security token
349+
350+
By default, Azure AD creates a SAML token that is valid for 1 hour.
351+
This lifetime cannot be customized in the Azure portal, or using a conditional access policy, but it can be done by creating a [custom token lifetime policy](../develop/active-directory-configurable-token-lifetimes.md) and apply it to the enterprise application created for SharePoint.
352+
To do this, complete the steps below using Windows PowerShell (at the time of this writing, AzureADPreview v2.0.2.149 does not work with PowerShell Core):
353+
354+
1. Install the module [AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview/):
355+
356+
```powershell
357+
Install-Module -Name AzureADPreview -Scope CurrentUser
358+
```
359+
360+
1. Run `Connect-AzureAD` to sign-in as a tenant administrator.
361+
362+
1. Run the sample script below to update the application `SharePoint corporate farm` to issue a SAML token valid for 6h (value `06:00:00` of property `AccessTokenLifetime`):
363+
364+
```powershell
365+
$appDisplayName = "SharePoint corporate farm"
366+
367+
$sp = Get-AzureADServicePrincipal -Filter "DisplayName eq '$appDisplayName'"
368+
$oldPolicy = Get-AzureADServicePrincipalPolicy -Id $sp.ObjectId | ?{$_.Type -eq "TokenLifetimePolicy"}
369+
if ($null -ne $oldPolicy) {
370+
# There can be only 1 TokenLifetimePolicy associated to the service principal (or 0, as by default)
371+
Remove-AzureADServicePrincipalPolicy -Id $sp.ObjectId -PolicyId $oldPolicy.Id
372+
}
373+
374+
# Create a custom TokenLifetimePolicy in Azure AD and add it to the service principal
375+
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"AccessTokenLifetime":"06:00:00"}}') -DisplayName "Custom token lifetime policy" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"
376+
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
377+
```
378+
379+
After the script completed, all users who successfully sign-in to the enterprise application will get a SAML 1.1 token valid for 6h in SharePoint.
380+
To revert the change, simply remove the custom `TokenLifetimePolicy` object from the service principal, as done at the beginning of the script.

articles/applied-ai-services/form-recognizer/concept-model-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ recommendations: false
5353

5454
[:::image type="icon" source="media/studio/read-card.png" :::](https://formrecognizer.appliedai.azure.com/studio/read)
5555

56-
The Read API analyzes and extracts ext lines, words, their locations, detected languages, and handwritten style if detected.
56+
The Read API analyzes and extracts lines, words, their locations, detected languages, and handwritten style if detected.
5757

5858
***Sample document processed using the [Form Recognizer Studio](https://formrecognizer.appliedai.azure.com/studio/read)***:
5959

articles/azure-maps/how-to-dev-guide-csharp-sdk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -392,11 +392,11 @@ The [Azure.Maps Namespace][Azure.Maps Namespace] in the .NET documentation.
392392
[rendering readme]: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/maps/Azure.Maps.Rendering/README.md
393393
[rendering sample]: https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/maps/Azure.Maps.Rendering/samples
394394
[geolocation package]: https://www.nuget.org/packages/Azure.Maps.geolocation
395-
[geolocation readme]: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/maps/Azure.Maps.geolocation/README.md
395+
[geolocation readme]: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/maps/Azure.Maps.Geolocation/README.md
396396
[geolocation sample]: https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/maps/Azure.Maps.Geolocation/samples
397397
[FuzzySearch]: /dotnet/api/azure.maps.search.mapssearchclient.fuzzysearch
398398
[Azure.Maps Namespace]: /dotnet/api/azure.maps
399399
[search-api]: /dotnet/api/azure.maps.search
400400
[Identity library .NET]: /dotnet/api/overview/azure/identity-readme?view=azure-dotnet
401401
[defaultazurecredential.NET]: /dotnet/api/overview/azure/identity-readme?view=azure-dotnet#defaultazurecredential
402-
[NuGet]: https://www.nuget.org/
402+
[NuGet]: https://www.nuget.org/

articles/azure-maps/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ landingContent:
3434
- linkListType: video
3535
links:
3636
- text: Introduction to Azure Maps
37-
url: https://sec.ch9.ms/ch9/d498/3d435d2c-ac85-421b-b3a7-5e0c7630d498/IoT_AzureMaps_high.mp4
37+
url: /shows/azure-videos/an-introduction-to-azure-maps
3838

3939
# Card
4040
- title: Get Started
@@ -283,4 +283,4 @@ landingContent:
283283
- linkListType: reference
284284
links:
285285
- text: Weather services
286-
url: /rest/api/maps/weather
286+
url: /rest/api/maps/weather

articles/azure-maps/rest-sdk-developer-guide.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Azure Maps Java SDK supports [Java 8][Java 8] or above.
8181
[C# rendering readme]: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/maps/Azure.Maps.Rendering/README.md
8282
[C# rendering sample]: https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/maps/Azure.Maps.Rendering/samples
8383
[C# geolocation package]: https://www.nuget.org/packages/Azure.Maps.geolocation
84-
[C# geolocation readme]: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/maps/Azure.Maps.geolocation/README.md
84+
[C# geolocation readme]: https://github.com/Azure/azure-sdk-for-net/blob/main/sdk/maps/Azure.Maps.Geolocation/README.md
8585
[C# geolocation sample]: https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/maps/Azure.Maps.Geolocation/samples
8686

8787
<!-- Python SDK Developers Guide --->
@@ -90,8 +90,8 @@ Azure Maps Java SDK supports [Java 8][Java 8] or above.
9090
[py search readme]: https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/maps/azure-maps-search/README.md
9191
[py search sample]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/maps/azure-maps-search/samples
9292
[py route package]: https://pypi.org/project/azure-maps-route
93-
[py route readme]: https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/maps/azure-maps-routing/README.md
94-
[py route sample]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/maps/azure-maps-routing/samples
93+
[py route readme]: https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/maps/azure-maps-route/README.md
94+
[py route sample]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/maps/azure-maps-route/samples
9595
[py render package]: https://pypi.org/project/azure-maps-render
9696
[py render readme]: https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/maps/azure-maps-render/README.md
9797
[py render sample]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/maps/azure-maps-render/samples
Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
---
2+
title: Collect SNMP trap data with Azure Monitor Agent
3+
description: Learn how to collect SNMP trap data and send the data to Azure Monitor Logs using Azure Monitor Agent.
4+
ms.topic: how-to
5+
ms.date: 06/22/2022
6+
ms.reviewer: shseth
7+
8+
---
9+
10+
# Collect SNMP trap data with Azure Monitor Agent
11+
12+
Simple Network Management Protocol (SNMP) is a widely-deployed management protocol for monitoring and configuring Linux devices and appliances.
13+
14+
You can collect SNMP data in two ways:
15+
16+
- **Polls** - The managing system polls an SNMP agent to gather values for specific properties.
17+
- **Traps** - An SNMP agent forwards events or notifications to a managing system.
18+
19+
Traps are most often used as event notifications, while polls are more appropriate for stateful health detection and collecting performance metrics.
20+
21+
You can use Azure Monitor Agent to collect SNMP traps as syslog events or as events logged in a text file.
22+
23+
In this tutorial, you learn how to:
24+
25+
> [!div class="checklist"]
26+
> * Set up the trap receiver log options and format
27+
> * Configure the trap receiver to send traps to syslog or text file
28+
> * Collect SNMP traps using Azure Monitor Agent
29+
30+
## Prerequisites
31+
32+
To complete this tutorial, you need:
33+
34+
- A Log Analytics workspace where you have at least [contributor rights](../logs/manage-access.md#azure-rbac).
35+
36+
- Management Information Base (MIB) files for the devices you are monitoring.
37+
38+
SNMP identifies monitored properties using Object Identifier (OID) values, which are defined and described in vendor-provided MIB files.
39+
40+
The device vendor typically provides MIB files. If you don't have the MIB files, you can find the files for many vendors on third-party websites.
41+
42+
Place all MIB files for each device that sends SNMP traps in `/usr/share/snmp/mibs`, the default directory for MIB files. This enables logging SNMP trap fields with meaningful names instead of OIDs.
43+
44+
Some vendors maintain a single MIB for all devices, while others have hundreds of MIB files. To load an MIB file correctly, snmptrapd must load all dependent MIBs. Be sure to check the snmptrapd log file after loading MIBs to ensure that there are no missing dependencies in parsing your MIB files.
45+
46+
- A Linux server with an SNMP trap receiver.
47+
48+
In this article, we use **snmptrapd**, an SNMP trap receiver from the [Net-SNMP](https://www.net-snmp.org/) agent, which most Linux distributions provide. However, there are many other SNMP trap receiver services you can use.
49+
50+
The snmptrapd configuration procedure may vary between Linux distributions. For more information on snmptrapd configuration, including guidance on configuring for SNMP v3 authentication, see the [Net-SNMP documentation](https://www.net-snmp.org/docs/man/snmptrapd.conf.html).
51+
52+
It's important that the SNMP trap receiver you use can load MIB files for your environment, so that the properties in the SNMP trap message have meaningful names instead of OIDs.
53+
54+
## Set up the trap receiver log options and format
55+
56+
To set up the snmptrapd trap receiver on a CentOS 7, Red Hat Enterprise Linux 7, Oracle Linux 7 server:
57+
58+
1. Install and enable snmptrapd:
59+
60+
```bash
61+
#Install the SNMP agent
62+
sudo yum install net-snmp
63+
#Enable the service
64+
sudo systemctl enable snmptrapd
65+
#Allow UDP 162 through the firewall
66+
sudo firewall-cmd --zone=public --add-port=162/udp --permanent
67+
```
68+
69+
1. Authorize community strings (SNMP v1 and v2 authentication strings) and define the format for the traps written to the log file:
70+
71+
1. Open `snmptrapd.conf`:
72+
73+
```bash
74+
sudo vi /etc/snmp/snmptrapd.conf
75+
```
76+
77+
1. Add these lines to your `snmptrapd.conf` file:
78+
79+
```bash
80+
# Allow all traps for all OIDs, from all sources, with a community string of public
81+
authCommunity log,execute,net public
82+
# Format logs for collection by Azure Monitor Agent
83+
format2 snmptrap %a %B %y/%m/%l %h:%j:%k %N %W %q %T %W %v \n
84+
```
85+
86+
> [!NOTE]
87+
> snmptrapd logs both traps and daemon messages - for example, service stop and start - to the same log file. In the example above, we’ve defined the log format to start with the word “snmptrap” to make it easy to filter snmptraps from the log later on.
88+
## Configure the trap receiver to send trap data to syslog or text file
89+
90+
There are two ways snmptrapd can send SNMP traps to Azure Monitor Agent:
91+
92+
- Forward incoming traps to syslog, which you can set as the data source for Azure Monitor Agent.
93+
94+
- Write the syslog messages to a file, which Azure Monitor Agent can *tail* and parse. This option allows you to send the SNMP traps as a new datatype rather than sending as syslog events.
95+
96+
To edit the output behavior configuration of snmptrapd:
97+
98+
1. Open the `/etc/snmp/snmptrapd.conf` file:
99+
100+
```bash
101+
sudo vi /etc/sysconfig/snmptrapd
102+
```
103+
104+
1. Configure the output destination.
105+
106+
Here's an example configuration:
107+
108+
```bash
109+
# snmptrapd command line options
110+
# '-f' is implicitly added by snmptrapd systemd unit file
111+
# OPTIONS="-Lsd"
112+
OPTIONS="-m ALL -Ls2 -Lf /var/log/snmptrapd"
113+
```
114+
115+
The options in this example configuration are:
116+
117+
- `-m ALL` - Load all MIB files in the default directory.
118+
- `-Ls2` - Output traps to syslog, to the Local2 facility.
119+
- `-Lf /var/log/snmptrapd` - Log traps to the `/var/log/snmptrapd` file.
120+
121+
> [!NOTE]
122+
> See Net-SNMP documentation for more information about [how to set output options](https://www.net-snmp.org/docs/man/snmpcmd.html) and [how to set formatting options](https://www.net-snmp.org/docs/man/snmptrapd.html).
123+
124+
## Collect SNMP traps using Azure Monitor Agent
125+
126+
If you configured snmptrapd to send events to syslog, follow the steps described in [Collect events and performance counters with Azure Monitor Agent](../agents/data-collection-rule-azure-monitor-agent.md). Make sure to select **Linux syslog** as the data source when you define the data collection rule for Azure Monitor Agent.
127+
128+
If you configured snmptrapd to write events to a file, follow the steps described in [Collect text and IIS logs with Azure Monitor agent](../agents/data-collection-text-log.md).
129+
130+
## Next steps
131+
132+
Learn more about:
133+
134+
- [Azure Monitor Agent](azure-monitor-agent-overview.md).
135+
- [Data collection rules](../essentials/data-collection-rule-overview.md).
136+
- [Best practices for cost management in Azure Monitor](../best-practices-cost.md).

articles/azure-monitor/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,6 +200,9 @@ items:
200200
- name: Collect text and IIS Logs
201201
displayName: data collection rule,Azure Monitor agent
202202
href: agents/data-collection-text-log.md
203+
- name: Collect SNMP traps
204+
displayName: data collection rule,Azure Monitor agent
205+
href: agents/data-collection-snmp-data.md
203206
- name: Define network settings
204207
href: agents/azure-monitor-agent-data-collection-endpoint.md
205208
- name: Migrate from Log Analytics Agent

articles/azure-video-indexer/logic-apps-connector-arm-accounts.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 11/16/2022
1313
Azure Video Indexer (AVI) [REST API](https://api-portal.videoindexer.ai/api-details#api=Operations&operation=Upload-Video) supports both server-to-server and client-to-server communication. The API enables you to integrate video and audio insights into your application logic.
1414

1515
> [!TIP]
16-
> For the latest `api-version`, chose the latest stable version in our documentation.
16+
> For the latest `api-version`, chose the latest stable version in [our REST documentation](/rest/api/videoindexer/stable/generate).
1717
1818
To make the integration easier, we support [Logic Apps](https://azure.microsoft.com/services/logic-apps/) and [Power Automate](https://preview.flow.microsoft.com/connectors/shared_videoindexer-v2/video-indexer-v2/) connectors that are compatible with the Azure Video Indexer API.
1919

@@ -115,12 +115,12 @@ The following image shows the first flow:
115115
116116
Search and create an **HTTP** action.
117117

118-
|Key| Value|
119-
|----|----|
120-
|Method | **POST**|
121-
| URI| [generateAccessToken](/rest/api/videoindexer/stable/generate/access-token?tabs=HTTP#generate-accesstoken-for-account-contributor). |
122-
| Body|`{ "permissionType": "Contributor", "scope": "Account" }` |
123-
| Add new parameter | **Authentication** |
118+
|Key| Value|Notes|
119+
|----|----|---|
120+
|Method | **POST**||
121+
| URI| [generateAccessToken](/rest/api/videoindexer/stable/generate/access-token?tabs=HTTP#generate-accesstoken-for-account-contributor). ||
122+
| Body|`{ "permissionType": "Contributor", "scope": "Account" }` |See the [REST doc example](/rest/api/videoindexer/preview/generate/access-token?tabs=HTTP#generate-accesstoken-for-account-contributor), make sure to delete the **POST** line.|
123+
| Add new parameter | **Authentication** ||
124124

125125
![Screenshot of the HTTP access token.](./media/logic-apps-connector-arm-accounts/http-with-param.png)
126126

0 commit comments

Comments
 (0)