Skip to content

Commit dd69b3c

Browse files
authored
Merge pull request #88334 from MicrosoftDocs/master
9/12 PM Publish
2 parents f3f4ec7 + 925a8af commit dd69b3c

File tree

220 files changed

+1157
-698
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

220 files changed

+1157
-698
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1780,6 +1780,11 @@
17801780
"redirect_url": "/azure/search/search-get-started-postman",
17811781
"redirect_document_id": false
17821782
},
1783+
{
1784+
"source_path": "articles/search/knowledge-store-connect-powerbi.md",
1785+
"redirect_url": "/azure/search/knowledge-store-create-portal",
1786+
"redirect_document_id": true
1787+
},
17831788
{
17841789
"source_path": "articles/search/search-create-index-rest-api.md",
17851790
"redirect_url": "/azure/search/search-get-started-powershell",
@@ -37733,11 +37738,6 @@
3773337738
"redirect_url": "/azure/azure-monitor/platform/diagnostic-logs-stream-log-store",
3773437739
"redirect_document_id": false
3773537740
},
37736-
{
37737-
"source_path": "articles/azure-monitor/log-query/simple-logs.md",
37738-
"redirect_url": "/azure/azure-monitor/log-query/log-query-overview",
37739-
"redirect_document_id": false
37740-
},
3774137741
{
3774237742
"source_path": "articles/azure-monitor/log-query/runbook-datacollect.md",
3774337743
"redirect_url": "/azure/azure-monitor/platform/data-collector-api",

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,14 @@ After the feature has been running in audit mode for a reasonable period, you ca
6262
* A Global Administrator account to register the proxy service for password protection and forest with Azure AD.
6363
* An account that has Active Directory domain administrator privileges in the forest root domain to register the Windows Server Active Directory forest with Azure AD.
6464
* Any Active Directory domain that runs the DC Agent service software must use Distributed File System Replication (DFSR) for sysvol replication.
65+
66+
If your domain is not already using DFSR, you MUST migrate it to use DFSR before installing Azure AD Password Protection. For more information, see the following link:
67+
68+
[SYSVOL Replication Migration Guide: FRS to DFS Replication](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd640019(v=ws.10))
69+
70+
> [!WARNING]
71+
> The Azure AD Password Protection DC Agent software will currently install on domain controllers in domains that are still using FRS (the predecessor technology to DFSR) for sysvol replication, but the software will NOT work properly in this environment. Additional negative side-effects include individual files failing to replicate, and sysvol restore procedures appearing to succeed but silently failing to replicate all files. You should migrate your domain to use DFSR as soon as possible, both for DFSR's inherent benefits and also to unblock the deployment of Azure AD Password Protection. Future versions of the software will be automatically disabled when running in a domain that is still using FRS.
72+
6573
* The Key Distribution Service must be enabled on all domain controllers in the domain that run Windows Server 2012. By default, this service is enabled via manual trigger start.
6674

6775
## Single-forest deployment

articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,13 @@ For more information, please see the following articles:
7575

7676
[The End is Nigh for FRS](https://blogs.technet.microsoft.com/filecab/2014/06/25/the-end-is-nigh-for-frs)
7777

78+
If your domain is not already using DFSR, you MUST migrate it to use DFSR before installing Azure AD Password Protection. For more information, see the following link:
79+
80+
[SYSVOL Replication Migration Guide: FRS to DFS Replication](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd640019(v=ws.10))
81+
82+
> [!WARNING]
83+
> The Azure AD Password Protection DC Agent software will currently install on domain controllers in domains that are still using FRS for sysvol replication, but the software will NOT work properly in this environment. Additional negative side-effects include individual files failing to replicate, and sysvol restore procedures appearing to succeed but silently failing to replicate all files. You should migrate your domain to use DFSR as soon as possible, both for DFSR's inherent benefits and also to unblock the deployment of Azure AD Password Protection. Future versions of the software will be automatically disabled when running in a domain that is still using FRS.
84+
7885
**Q: How much disk space does the feature require on the domain sysvol share?**
7986

8087
The precise space usage varies since it depends on factors such as the number and length of the banned tokens in the Microsoft global banned list and the per-tenant custom list, plus encryption overhead. The contents of these lists are likely to grow in the future. With that in mind, a reasonable expectation is that the feature will need at least five (5) megabytes of space on the domain sysvol share.

articles/active-directory/fundamentals/customize-branding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Use your organization's logo and custom color schemes to provide a consistent lo
2626
## Customize your Azure AD sign-in page
2727
You can customize your Azure AD sign-in pages, which appear when users sign in to your organization's tenant-specific apps, such as [*https://outlook.com/contoso.com*](https://outlook.com/contoso.com), or when passing a domain variable, such as [*https://passwordreset.microsoftonline.com/?whr=contoso.com*](https://passwordreset.microsoftonline.com/?whr=contoso.com).
2828

29-
Your custom branding won't immediately appear when your users go to sites such as, www\.office.com. Instead, the user has to sign-in before your customized branding appears.
29+
Your custom branding won't immediately appear when your users go to sites such as, www\.office.com. Instead, the user has to sign-in before your customized branding appears. After the user has signed in, the branding may take 15 minutes or longer to appear.
3030

3131
> [!NOTE]
3232
> All branding elements are optional. For example, if you specify a banner logo with no background image, the sign-in page will show your logo with a default background image from the destination site (for example, Office 365).<br><br>Additionally, sign-in page branding doesn’t carry over to personal Microsoft accounts. If your users or business guests sign in using a personal Microsoft account, the sign-in page won't reflect the branding of your organization.

articles/active-directory/managed-identities-azure-resources/services-support-managed-identities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The following Azure services support managed identities for Azure resources:
2828
| Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
2929
| --- | --- | --- | --- | --- |
3030
| System assigned | Available | Preview | Preview | Preview |
31-
| User assigned | Preview | Preview | Preview | Preview |
31+
| User assigned | Available | Preview | Preview | Preview |
3232

3333
Refer to the following list to configure managed identity for Azure Virtual Machines (in regions where available):
3434

@@ -43,7 +43,7 @@ Refer to the following list to configure managed identity for Azure Virtual Mach
4343
|Managed identity type | All Generally Available<br>Global Azure Regions | Azure Government | Azure Germany | Azure China 21Vianet |
4444
| --- | --- | --- | --- | --- |
4545
| System assigned | Available | Preview | Preview | Preview |
46-
| User assigned | Preview | Preview | Preview | Preview |
46+
| User assigned | Available | Preview | Preview | Preview |
4747

4848
Refer to the following list to configure managed identity for Azure Virtual Machine Scale Sets (in regions where available):
4949

@@ -205,7 +205,7 @@ Refer to the following list to configure access to Azure Resource Manager:
205205

206206
| Cloud | Resource ID | Status |
207207
|--------|------------|--------|
208-
| Azure Global | `https://eventhubs.azure.net` | Preview |
208+
| Azure Global | `https://eventhubs.azure.net` | Available |
209209
| Azure Government | | Not Available |
210210
| Azure Germany | | Not Available |
211211
| Azure China 21Vianet | | Not Available |
@@ -214,7 +214,7 @@ Refer to the following list to configure access to Azure Resource Manager:
214214

215215
| Cloud | Resource ID | Status |
216216
|--------|------------|--------|
217-
| Azure Global | `https://servicebus.azure.net` | Preview |
217+
| Azure Global | `https://servicebus.azure.net` | Available |
218218
| Azure Government | | Not Available |
219219
| Azure Germany | | Not Available |
220220
| Azure China 21Vianet | | Not Available |

articles/analysis-services/analysis-services-logging.md

Lines changed: 40 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: minewiskan
55
manager: kfile
66
ms.service: azure-analysis-services
77
ms.topic: conceptual
8-
ms.date: 02/14/2019
8+
ms.date: 09/12/2019
99
ms.author: owend
1010
ms.reviewer: minewiskan
1111

@@ -62,7 +62,7 @@ Selecting **Engine** logs all [xEvents](https://docs.microsoft.com/analysis-serv
6262

6363
### All metrics
6464

65-
The Metrics category logs the same [Server metrics](analysis-services-monitor.md#server-metrics) displayed in Metrics.
65+
The Metrics category logs the same [Server metrics](analysis-services-monitor.md#server-metrics) to the AzureMetrics table. If you're using query [scale-out](analysis-services-scale-out.md) and need to separate metrics for each read replica, use the AzureDiagnostics table instead, where **OperationName** is equal to **LogMetric**.
6666

6767
## Setup diagnostics logging
6868

@@ -156,27 +156,53 @@ To view your diagnostic data, in Log Analytics workspace, open **Logs** from th
156156

157157
In the query builder, expand **LogManagement** > **AzureDiagnostics**. AzureDiagnostics includes Engine and Service events. Notice a query is created on-the-fly. The EventClass\_s field contains xEvent names, which may look familiar if you've used xEvents for on-premises logging. Click **EventClass\_s** or one of the event names and Log Analytics workspace continues constructing a query. Be sure to save your queries to reuse later.
158158

159-
### Example query
160-
This query calculates and returns CPU for each query end/refresh end event for a model database and server:
159+
### Example queries
160+
161+
#### Example 1
162+
163+
The following query returns durations for each query end/refresh end event for a model database and server. If scaled out, the results are broken out by replica because the replica number is included in ServerName_s. Grouping by RootActivityId_g reduces the row count retrieved from the Azure Diagnostics REST API and helps stay within the limits as described in [Log Analytics Rate limits](https://dev.loganalytics.io/documentation/Using-the-API/Limits).
161164

162165
```Kusto
163-
let window = AzureDiagnostics
164-
| where ResourceProvider == "MICROSOFT.ANALYSISSERVICES" and ServerName_s =~"MyServerName" and DatabaseName_s == "Adventure Works Localhost" ;
166+
let window = AzureDiagnostics
167+
| where ResourceProvider == "MICROSOFT.ANALYSISSERVICES" and Resource =~ "MyServerName" and DatabaseName_s =~ "MyDatabaseName" ;
165168
window
166169
| where OperationName has "QueryEnd" or (OperationName has "CommandEnd" and EventSubclass_s == 38)
167170
| where extract(@"([^,]*)", 1,Duration_s, typeof(long)) > 0
168171
| extend DurationMs=extract(@"([^,]*)", 1,Duration_s, typeof(long))
169-
| extend Engine_CPUTime=extract(@"([^,]*)", 1,CPUTime_s, typeof(long))
170-
| project StartTime_t,EndTime_t,ServerName_s,OperationName,RootActivityId_g ,TextData_s,DatabaseName_s,ApplicationName_s,Duration_s,EffectiveUsername_s,User_s,EventSubclass_s,DurationMs,Engine_CPUTime
171-
| join kind=leftouter (
172-
window
173-
| where OperationName == "ProgressReportEnd" or (OperationName == "VertiPaqSEQueryEnd" and EventSubclass_s != 10) or OperationName == "DiscoverEnd" or (OperationName has "CommandEnd" and EventSubclass_s != 38)
174-
| summarize sum_Engine_CPUTime = sum(extract(@"([^,]*)", 1,CPUTime_s, typeof(long))) by RootActivityId_g
175-
) on RootActivityId_g
176-
| extend totalCPU = sum_Engine_CPUTime + Engine_CPUTime
172+
| project StartTime_t,EndTime_t,ServerName_s,OperationName,RootActivityId_g,TextData_s,DatabaseName_s,ApplicationName_s,Duration_s,EffectiveUsername_s,User_s,EventSubclass_s,DurationMs
173+
| order by StartTime_t asc
174+
```
175+
176+
#### Example 2
177177

178+
The following query returns memory and QPU consumption for a server. If scaled out, the results are broken out by replica because the replica number is included in ServerName_s.
179+
180+
```Kusto
181+
let window = AzureDiagnostics
182+
| where ResourceProvider == "MICROSOFT.ANALYSISSERVICES" and Resource =~ "MyServerName";
183+
window
184+
| where OperationName == "LogMetric"
185+
| where name_s == "memory_metric" or name_s == "qpu_metric"
186+
| project ServerName_s, TimeGenerated, name_s, value_s
187+
| summarize avg(todecimal(value_s)) by ServerName_s, name_s, bin(TimeGenerated, 1m)
188+
| order by TimeGenerated asc
178189
```
179190

191+
#### Example 3
192+
193+
The following query returns the Rows read/sec Analysis Services engine performance counters for a server.
194+
195+
```Kusto
196+
let window = AzureDiagnostics
197+
| where ResourceProvider == "MICROSOFT.ANALYSISSERVICES" and Resource =~ "MyServerName";
198+
window
199+
| where OperationName == "LogMetric"
200+
| where parse_json(tostring(parse_json(perfobject_s).counters))[0].name == "Rows read/sec"
201+
| extend Value = tostring(parse_json(tostring(parse_json(perfobject_s).counters))[0].value)
202+
| project ServerName_s, TimeGenerated, Value
203+
| summarize avg(todecimal(Value)) by ServerName_s, bin(TimeGenerated, 1m)
204+
| order by TimeGenerated asc
205+
```
180206

181207
There are hundreds of queries you can use. To learn more about queries, see [Get started with Azure Monitor log queries](../azure-monitor/log-query/get-started-queries.md).
182208

articles/analysis-services/analysis-services-monitor.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: minewiskan
55
manager: kfile
66
ms.service: azure-analysis-services
77
ms.topic: conceptual
8-
ms.date: 07/26/2019
8+
ms.date: 09/12/2019
99
ms.author: owend
1010
ms.reviewer: minewiskan
1111

@@ -50,6 +50,10 @@ Use this table to determine which metrics are best for your monitoring scenario.
5050
|MemoryLimitLow|Memory: Memory Limit Low|Bytes|Average|Low memory limit, from configuration file.|
5151
|MemoryLimitVertiPaq|Memory: Memory Limit VertiPaq|Bytes|Average|In-memory limit, from configuration file.|
5252
|MemoryUsage|Memory: Memory Usage|Bytes|Average|Memory usage of the server process as used in calculating cleaner memory price. Equal to counter Process\PrivateBytes plus the size of memory-mapped data, ignoring any memory, which was mapped or allocated by the in-memory analytics engine (VertiPaq) in excess of the engine Memory Limit.|
53+
|private_bytes_metric|Private Bytes |Bytes|Average|The total amount of memory the Analysis Services engine process and Mashup container processes have allocated, not including memory shared with other processes.|
54+
|virtual_bytes_metric|Virtual Bytes |Bytes|Average|The current size of the virtual address space that Analysis Services engine process and Mashup container processes are using.|
55+
|mashup_engine_private_bytes_metric|M Engine Private Bytes |Bytes|Average|The total amount of memory Mashup container processes have allocated, not including memory shared with other processes.|
56+
|mashup_engine_virtual_bytes_metric|M Engine Virtual Bytes |Bytes|Average|The current size of the virtual address space Mashup container processes are using.|
5357
|Quota|Memory: Quota|Bytes|Average|Current memory quota, in bytes. Memory quota is also known as a memory grant or memory reservation.|
5458
|QuotaBlocked|Memory: Quota Blocked|Count|Average|Current number of quota requests that are blocked until other memory quotas are freed.|
5559
|VertiPaqNonpaged|Memory: VertiPaq Nonpaged|Bytes|Average|Bytes of memory locked in the working set for use by the in-memory engine.|

articles/analysis-services/analysis-services-vnet-gateway.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: minewiskan
55
manager: kfile
66
ms.service: azure-analysis-services
77
ms.topic: conceptual
8-
ms.date: 01/09/2019
8+
ms.date: 09/12/2019
99
ms.author: owend
1010
ms.reviewer: minewiskan
1111

@@ -16,10 +16,12 @@ This article describes the **AlwaysUseGateway** server property for use when dat
1616

1717
## Server access to VNet data sources
1818

19-
If your data sources are accessed through a VNet, your Azure Analysis Services server must connect to those data sources as if they are on-premises, in your own environment. You can configure the **AlwaysUseGateway** server property to specify the server to access all datasource data through an [On-premises gateway](analysis-services-gateway.md).
19+
If your data sources are accessed through a VNet, your Azure Analysis Services server must connect to those data sources as if they are on-premises, in your own environment. You can configure the **AlwaysUseGateway** server property to specify the server to access all data sources through an [On-premises gateway](analysis-services-gateway.md).
20+
21+
Azure SQL Database Managed Instance data sources run within Azure VNet with a private IP address. If public endpoint is enabled on the instance, a gateway is not required. If public endpoint is not enabled, an On-premises Data Gateway is required and the AlwaysUseGateway property must be set to true.
2022

2123
> [!NOTE]
22-
> This property is effective only when an [On-premises data gateway](analysis-services-gateway.md) is installed and configured. The gateway can be on the VNet.
24+
> This property is effective only when an [On-premises Data Gateway](analysis-services-gateway.md) is installed and configured. The gateway can be on the VNet.
2325
2426
## Configure AlwaysUseGateway property
2527

articles/azure-functions/durable/durable-functions-entities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Entities (sometimes referred to as entity *instances*) are accessed via a unique
2828

2929
For example, a *counter* entity function might be used for keeping score in an online game. Each instance of the game will have a unique entity ID, such as `@Counter@Game1`, `@Counter@Game2`, and so on. All operations that target a particular entity require specifying an entity ID as a parameter.
3030

31-
## Programing models
31+
## Programming models
3232

3333
Durable entities support two different programming models. The first model is a dynamic "functional" model where the entity is defined by a single function. The second model is an object-oriented model where the entity is defined by a class and methods. These models and the programming models for interacting with entities are described in the next sections.
3434

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: Simple Logs experience in Azure Monitor (Preview) | Microsoft Docs
3+
description: The Simple Logs experience allows you to create basic queries in Azure Monitor without directly interacting with KQL.
4+
services: log-analytics
5+
documentationcenter: ''
6+
author: bwren
7+
manager: carmonm
8+
editor: ''
9+
ms.assetid:
10+
ms.service: log-analytics
11+
ms.workload: na
12+
ms.tgt_pltfrm: na
13+
ms.topic: conceptual
14+
ms.date: 09/12/2019
15+
ms.author: bwren
16+
---
17+
18+
# Simple Logs experience in Azure Monitor (Preview)
19+
Azure Monitor provides a [rich experience](get-started-portal.md) for creating [log queries](log-query-overview.md) using the KQL language. You may not require the full power of KQL though and prefer a simplified experience for basic query requirements. The Simple Logs experience allows you to create basic queries without directly interacting with KQL. You can also use Simple Logs as a learning tool for KQL as you require more sophisticated queries.
20+
21+
> [!NOTE]
22+
> Simple Logs is currently implemented as a test for only Cosmos DB and Key Vaults. Please share your experience with Microsoft through [User Voice](https://feedback.azure.com/forums/913690-azure-monitor) to help us determine whether we will expand and release this feature.
23+
24+
25+
## Scope
26+
The Simple Logs experience retrieves data from the *AzureDiagnostics*, *AzureMetrics*, and *AzureActivity* table for the selected resource.
27+
28+
## Using Simple Logs
29+
Navigate to any Cosmos DB or Key Vault in your Azure subscription with [diagnostic settings configured to collect logs in a Log Analytics workspace](../platform/diagnostic-logs-stream-log-store.md). Click **Logs** in the **Monitoring** menu to open the Simple Logs experience.
30+
31+
![Menu](media/simple-logs/menu.png)
32+
33+
Select a **Field** and an **Operator** and specify a **Value** for comparison. Click **+** and specify **And/Or** to add additional criteria.
34+
35+
![Criteria](media/simple-logs/criteria.png)
36+
37+
Click **Run** to view the query results.
38+
39+
## View and edit KQL
40+
Select **Query editor** to open the KQL generated by the Simple Logs query in the full Log Analytics experience.
41+
42+
![Query editor](media/simple-logs/query-editor.png)
43+
44+
You can directly edit the KQL and use other features in Log Analytics such as filters to further refine your results.
45+
46+
![Edit KQL](media/simple-logs/edit-kql.png)
47+
48+
49+
## Next steps
50+
51+
- Complete a tutorial on [using Log Analytics in the Azure portal](get-started-portal.md).
52+
- Complete a tutorial on [writing log queries](get-started-portal.md).

0 commit comments

Comments
 (0)