You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/developer-portal-integrate-application-insights.md
+27-8Lines changed: 27 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure API Management
4
4
description: Learn how to integrate Application Insights into your managed or self-hosted developer portal.
5
5
author: dlepow
6
6
ms.author: danlep
7
-
ms.date: 03/25/2021
7
+
ms.date: 08/16/2022
8
8
ms.service: api-management
9
9
ms.topic: how-to
10
10
---
@@ -18,7 +18,7 @@ A popular feature of Azure Monitor is Application Insights. It's an extensible A
18
18
Follow these steps to plug Application Insights into your managed or self-hosted developer portal.
19
19
20
20
> [!IMPORTANT]
21
-
> Steps 1 and 2 are not required for managed portals. If you have a managed portal, skip to step 4.
21
+
> Steps 1 -3 are not required for managed portals. If you have a managed portal, skip to step 4.
22
22
23
23
1. Set up a [local environment](developer-portal-self-host.md#step-1-set-up-local-environment) for the latest release of the developer portal.
24
24
@@ -28,23 +28,33 @@ Follow these steps to plug Application Insights into your managed or self-hosted
28
28
npm install @paperbits/azure --save
29
29
```
30
30
31
-
1. In the `startup.publish.ts` file in the `src` folder, import and register the Application Insights module:
31
+
1. In the `startup.publish.ts` file in the `src` folder, import and register the Application Insights module. Add the `AppInsightsPublishModule` after the existing modules in the dependency injection container:
32
32
33
33
```typescript
34
34
import { AppInsightsPublishModule } from "@paperbits/azure";
1. Retrieve the portal's configuration using the [Content Item - Get](/rest/api/apimanagement/current-ga/content-item/get) REST API:
40
44
41
45
```http
42
-
GET /contentTypes/document/contentItems/configuration
46
+
GET https://management.azure.com/subscriptions/{subscription-id}/resourceGroups/{resource-group-name}/providers/Microsoft.ApiManagement/service/{api-management-service-name}/contentTypes/document/contentItems/configuration?api-version=2021-08-01
"title": "Microsoft Azure API Management - developer portal",
@@ -55,17 +65,23 @@ Follow these steps to plug Application Insights into your managed or self-hosted
55
65
}
56
66
}
57
67
]
68
+
}
58
69
}
59
70
```
60
71
61
-
1. Extend the site configuration from the previous step with Application Insights configuration:
72
+
1. Extend the site configuration from the previous step with Application Insights configuration. Update the configuration using the [Content Item - Create or Update](/rest/api/apimanagement/current-ga/content-item/create-or-update) REST API. Pass the Application Insights instrumentation key in an `integration` node in the request body.
73
+
62
74
63
75
```http
64
-
PUT /contentTypes/document/contentItems/configuration
76
+
PUT https://management.azure.com/subscriptions/{subscription-id}/resourceGroups/{resource-group-name}/providers/Microsoft.ApiManagement/service/{api-management-service-name}/contentTypes/document/contentItems/configuration?api-version=2021-08-01
@@ -76,9 +92,12 @@ Follow these steps to plug Application Insights into your managed or self-hosted
76
92
}
77
93
}
78
94
]
95
+
}
79
96
}
80
97
```
81
98
99
+
1. After you update the configuration, [republish the portal](api-management-howto-developer-portal-customize.md#publish) for the changes to take effect.
Copy file name to clipboardExpand all lines: articles/cosmos-db/cassandra/cli-samples.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: seesharprun
5
5
ms.service: cosmos-db
6
6
ms.subservice: cosmosdb-cassandra
7
7
ms.topic: sample
8
-
ms.date: 02/21/2022
8
+
ms.date: 08/19/2022
9
9
ms.author: sidandrews
10
10
ms.reviewer: mjbrown
11
11
ms.custom: devx-track-azurecli
@@ -41,6 +41,7 @@ These samples apply to all Azure Cosmos DB APIs. These samples use a SQL (Core)
41
41
|[Secure with IP firewall](../scripts/cli/common/ipfirewall.md)| Create a Cosmos account with IP firewall configured.|
42
42
|[Secure new account with service endpoints](../scripts/cli/common/service-endpoints.md)| Create a Cosmos account and secure with service-endpoints.|
43
43
|[Secure existing account with service endpoints](../scripts/cli/common/service-endpoints-ignore-missing-vnet.md)| Update a Cosmos account to secure with service-endpoints when the subnet is eventually configured.|
44
+
|[Find existing free-tier account](../scripts/cli/common/free-tier.md)| Find whether there is an existing free-tier account in your subscription.|
Copy file name to clipboardExpand all lines: articles/cosmos-db/graph/cli-samples.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: seesharprun
5
5
ms.service: cosmos-db
6
6
ms.subservice: cosmosdb-graph
7
7
ms.topic: sample
8
-
ms.date: 02/21/2022
8
+
ms.date: 08/19/2022
9
9
ms.author: sidandrews
10
10
ms.reviewer: mjbrown
11
11
ms.custom: devx-track-azurecli
@@ -41,6 +41,7 @@ These samples apply to all Azure Cosmos DB APIs. These samples use a SQL (Core)
41
41
|[Secure with IP firewall](../scripts/cli/common/ipfirewall.md)| Create a Cosmos account with IP firewall configured.|
42
42
|[Secure new account with service endpoints](../scripts/cli/common/service-endpoints.md)| Create a Cosmos account and secure with service-endpoints.|
43
43
|[Secure existing account with service endpoints](../scripts/cli/common/service-endpoints-ignore-missing-vnet.md)| Update a Cosmos account to secure with service-endpoints when the subnet is eventually configured.|
44
+
|[Find existing free-tier account](../scripts/cli/common/free-tier.md)| Find whether there is an existing free-tier account in your subscription.|
Copy file name to clipboardExpand all lines: articles/cosmos-db/mongodb/cli-samples.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: seesharprun
5
5
ms.service: cosmos-db
6
6
ms.subservice: cosmosdb-mongo
7
7
ms.topic: sample
8
-
ms.date: 02/21/2022
8
+
ms.date: 08/18/2022
9
9
ms.author: sidandrews
10
10
ms.reviewer: mjbrown
11
11
ms.custom: devx-track-azurecli
@@ -41,6 +41,7 @@ These samples apply to all Azure Cosmos DB APIs. These samples use a SQL (Core)
41
41
|[Secure with IP firewall](../scripts/cli/common/ipfirewall.md)| Create a Cosmos account with IP firewall configured.|
42
42
|[Secure new account with service endpoints](../scripts/cli/common/service-endpoints.md)| Create a Cosmos account and secure with service-endpoints.|
43
43
|[Secure existing account with service endpoints](../scripts/cli/common/service-endpoints-ignore-missing-vnet.md)| Update a Cosmos account to secure with service-endpoints when the subnet is eventually configured.|
44
+
|[Find existing free-tier account](../scripts/cli/common/free-tier.md)| Find whether there is an existing free-tier account in your subscription.|
Copy file name to clipboardExpand all lines: articles/cosmos-db/sql/cli-samples.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: seesharprun
5
5
ms.service: cosmos-db
6
6
ms.subservice: cosmosdb-sql
7
7
ms.topic: sample
8
-
ms.date: 02/21/2022
8
+
ms.date: 08/19/2022
9
9
ms.author: sidandrews
10
10
ms.reviewer: mjbrown
11
11
ms.custom: devx-track-azurecli, seo-azure-cli
@@ -42,6 +42,7 @@ These samples apply to all Azure Cosmos DB APIs. These samples use a SQL (Core)
42
42
|[Secure with IP firewall](../scripts/cli/common/ipfirewall.md)| Create a Cosmos account with IP firewall configured.|
43
43
|[Secure new account with service endpoints](../scripts/cli/common/service-endpoints.md)| Create a Cosmos account and secure with service-endpoints.|
44
44
|[Secure existing account with service endpoints](../scripts/cli/common/service-endpoints-ignore-missing-vnet.md)| Update a Cosmos account to secure with service-endpoints when the subnet is eventually configured.|
45
+
|[Find existing free-tier account](../scripts/cli/common/free-tier.md)| Find whether there is an existing free-tier account in your subscription.|
Copy file name to clipboardExpand all lines: articles/cosmos-db/table/cli-samples.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: seesharprun
5
5
ms.service: cosmos-db
6
6
ms.subservice: cosmosdb-table
7
7
ms.topic: sample
8
-
ms.date: 02/21/2022
8
+
ms.date: 08/19/2022
9
9
ms.author: sidandrews
10
10
ms.reviewer: mjbrown
11
11
ms.custom: devx-track-azurecli
@@ -41,6 +41,7 @@ These samples apply to all Azure Cosmos DB APIs. These samples use a SQL (Core)
41
41
|[Secure with IP firewall](../scripts/cli/common/ipfirewall.md)| Create a Cosmos account with IP firewall configured.|
42
42
|[Secure new account with service endpoints](../scripts/cli/common/service-endpoints.md)| Create a Cosmos account and secure with service-endpoints.|
43
43
|[Secure existing account with service endpoints](../scripts/cli/common/service-endpoints-ignore-missing-vnet.md)| Update a Cosmos account to secure with service-endpoints when the subnet is eventually configured.|
44
+
|[Find existing free-tier account](../scripts/cli/common/free-tier.md)| Find whether there is an existing free-tier account in your subscription.|
Copy file name to clipboardExpand all lines: articles/dns/private-resolver-endpoints-rulesets.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ The IP address associated with an inbound endpoint is always part of the private
29
29
30
30
Outbound endpoints egress from Azure and can be linked to [DNS Forwarding Rulesets](#dns-forwarding-rulesets).
31
31
32
-
Outbound endpoints are also part of the private virtual network address space where the private resolver is deployed. An endpoint is associated with a subnet, but isn't provisioned with an IP address like the inbound endpoint. No other resources can exist in the same subnet with the inbound endpoint. The following screenshot shows an inbound endpoint inside the subnet `snet-E-outbound`.
32
+
Outbound endpoints are also part of the private virtual network address space where the private resolver is deployed. An outbound endpoint is associated with a subnet, but isn't provisioned with an IP address like the inbound endpoint. No other resources can exist in the same subnet with the outbound endpoint. The following screenshot shows an outbound endpoint inside the subnet `snet-E-outbound`.
@@ -44,13 +44,18 @@ Rulesets have the following associations:
44
44
45
45
A ruleset can't be linked to a virtual network in another region.
46
46
47
-
When you link a ruleset to a virtual network, resources within that virtual network will use the DNS forwarding rules enabled in the ruleset. The linked virtual network must peer with the virtual network where the outbound endpoint exists. This configuration is typically used in a hub and spoke design, with spoke vnets peered to a hub vnet that has one or more private resolver endpoints. In this hub and spoke scenario, the spoke vnet does not need to be linked to the private DNS zone in order to resolve resource records in the zone, because the forwarding ruleset rule for the private zone sends queries to the hub vnet's inbound endpoint. For example: **azure.contoso.com** to **10.10.0.4**.
47
+
When you link a ruleset to a virtual network, resources within that virtual network will use the DNS forwarding rules enabled in the ruleset. The linked virtual network must peer with the virtual network where the outbound endpoint exists. This configuration is typically used in a hub and spoke design, with spoke vnets peered to a hub vnet that has one or more private resolver endpoints. In this hub and spoke scenario, the spoke vnet does not need to be linked to the private DNS zone in order to resolve resource records in the zone. In this case, the forwarding ruleset rule for the private zone sends queries to the hub vnet's inbound endpoint. For example: **azure.contoso.com** to **10.10.0.4**.
48
48
49
49
The following screenshot shows a DNS forwarding ruleset linked to two virtual networks: a hub vnet: **myeastvnet**, and a spoke vnet: **myeastspoke**.
Virtual network links for DNS forwarding rulesets enable resources in vnets to use forwarding rules when resolving DNS names. Vnets that are linked from a ruleset but don't have their own private resolver must have a peering connection to the vnet that contains the private resolver. The vnet with the private resolver must also be linked from any private DNS zones for which there are ruleset rules.
53
+
Virtual network links for DNS forwarding rulesets enable resources in vnets to use forwarding rules when resolving DNS names. Vnets that are linked from a ruleset, but don't have their own private resolver, must have a peering connection to the vnet that contains the private resolver. The vnet with the private resolver must also be linked from any private DNS zones for which there are ruleset rules.
54
+
55
+
For example, resources in the vnet `myeastspoke` can resolve records in the private DNS zone `azure.contoso.com` if:
56
+
- The vnet `myeastspoke` peers with `myeastvnet`
57
+
- The ruleset provisioned in `myeastvnet` is linked to `myeastspoke` and `myeastvnet`
58
+
- A ruleset rule is configured and enabled in the linked ruleset to resolve `azure.contoso.com` using the inbound endpoint in `myeastvnet`
Copy file name to clipboardExpand all lines: articles/dns/tutorial-dns-private-resolver-failover.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,7 @@ Now that DNS resolution is working from on-premises to Azure using two different
127
127
> [!NOTE]
128
128
> The DNS server that you use to configure forwarding should be a server that client devices on your network will use for DNS resolution. If the server you're configuring is not the default, you'll need to query it's IP address directly (ex: nslookup test.azure.contoso.com 10.100.0.2) after forwarding is configured.
129
129
130
-
1. Open an elevated Windows PowerShell prompt and prompt commands. Replace **azure.contoso.com** with the name of your private zone, and replace the IP addresses below with the IP addresses for your private resolvers.
130
+
1. Open an elevated Windows PowerShell prompt and issue the following command. Replace **azure.contoso.com** with the name of your private zone, and replace the IP addresses below with the IP addresses of your private resolvers.
Copy file name to clipboardExpand all lines: articles/key-vault/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Key Vault
3
3
description: Lists Azure Policy built-in policy definitions for Key Vault. These built-in policy definitions provide common approaches to managing your Azure resources.
0 commit comments