Skip to content

Commit e1914a8

Browse files
authored
Merge pull request #293460 from MicrosoftDocs/main
Publish to live, Thursday 4 AM PST, 1/23
2 parents dc7a96c + 24d6a1b commit e1914a8

File tree

7 files changed

+113
-16
lines changed

7 files changed

+113
-16
lines changed

articles/energy-data-services/how-to-deploy-osdu-admin-ui.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,7 @@ There are two deployment options for the OSDU Admin UI:
144144
```
145145
146146
## Deploy storage account
147+
147148
1. Create resource group. Skip this step if the resource group exists already.
148149
149150
```azurecli
@@ -183,7 +184,7 @@ There are two deployment options for the OSDU Admin UI:
183184
--public-access blob
184185
```
185186
186-
### Build and deploy the web app
187+
### Configure the website
187188
188189
1. Navigate to the `OSDUApp` folder.
189190
@@ -282,11 +283,14 @@ Replace the values according to the explanation.
282283
}
283284
...
284285
}
286+
285287
```
286288
287-
> [!NOTE]
288-
> [OSDU Connector API](https://community.opengroup.org/osdu/ui/admin-ui-group/admin-ui-totalenergies/connector-api-totalenergies) is built as an interface between consumers and OSDU APIs wrapping some API chain calls and objects. Currently, it manages all operations and actions on project and scenario objects.
289-
289+
---
290+
291+
> [!NOTE]
292+
> [OSDU Connector API](https://community.opengroup.org/osdu/ui/admin-ui-group/admin-ui-totalenergies/connector-api-totalenergies) is built as an interface between consumers and OSDU APIs wrapping some API chain calls and objects. Currently, it manages all operations and actions on project and scenario objects.
293+
290294
1. Build the web UI.
291295
```bash
292296
ng build
@@ -300,7 +304,7 @@ Replace the values according to the explanation.
300304
--destination '$web' \
301305
--overwrite
302306
```
303-
307+
304308
1. Fetch the website URL.
305309
```bash
306310
echo $REDIRECT_URI

articles/migrate/vmware/tutorial-discover-vmware.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: Vikram1988
55
ms.author: vibansa
66
ms.manager: abhemraj
77
ms.topic: tutorial
8-
ms.date: 11/20/2024
8+
ms.date: 01/23/2025
99
ms.service: azure-migrate
1010
ms.custom: vmware-scenario-422, mvc, subject-rbac-steps, engagement-fy24
1111
#Customer intent: As an VMware admin, I want to discover my on-premises servers running in a VMware environment.
@@ -41,7 +41,7 @@ Requirement | Details
4141
--- | ---
4242
**vCenter Server/ESXi host** | You need a server running vCenter Server version 8.0, 7.0, 6.7, 6.5, 6.0, or 5.5.<br /><br /> Servers must be hosted on an ESXi host running version 5.5 or later.<br /><br /> On the vCenter Server, allow inbound connections on TCP port 443 so that the appliance can collect configuration and performance metadata.<br /><br /> The appliance connects to vCenter Server on port 443 by default. If the server running vCenter Server listens on a different port, you can modify the port when you provide the vCenter Server details in the appliance configuration manager.<br /><br /> On the ESXi hosts, make sure that inbound access is allowed on TCP port 443 for discovery of installed applications and for agentless dependency analysis on servers.
4343
**Azure Migrate appliance** | vCenter Server must have these resources to allocate to a server that hosts the Azure Migrate appliance:<br /><br /> - 32 GB of RAM, 8 vCPUs, and approximately 80 GB of disk storage.<br /><br /> - An external virtual switch and internet access on the appliance server, directly or via a proxy.
44-
**Servers** | All Windows and Linux OS versions are supported for discovery of configuration and performance metadata. <br /><br /> For application discovery on servers, all Windows and Linux OS versions are supported. Check the [OS versions supported for agentless dependency analysis](migrate-support-matrix-vmware.md?pivots=dependency-analysis-agentless-requirements&tabs=businesscase).<br /><br /> For discovery of installed applications and for agentless dependency analysis, VMware Tools (version 10.2.1 or later) must be installed and running on servers. Windows servers must have PowerShell version 2.0 or later installed.<br /><br /> To discover SQL Server instances and databases, check [supported SQL Server and Windows OS versions and editions](migrate-support-matrix-vmware.md?pivots=sql-server-instance-database-discovery-requirements&tabs=businesscase) and Windows authentication mechanisms.<br /><br /> To discover ASP.NET web apps running on IIS web server, check [supported Windows OS and IIS versions](migrate-support-matrix-vmware.md?pivots=web-apps-discovery&tabs=businesscase).<br /><br /> To discover Java web apps running on Apache Tomcat web server, check [supported Linux OS and Tomcat versions](migrate-support-matrix-vmware.md?pivots=web-apps-discovery&tabs=businesscase).
44+
**Servers** | All Windows and Linux OS versions are supported for discovery of configuration and performance metadata. <br /><br /> For application discovery on servers, all Windows and Linux OS versions are supported. Check the [OS versions supported for agentless dependency analysis](migrate-support-matrix-vmware.md#dependency-analysis-requirements-agentless).<br /><br /> For discovery of installed applications and for agentless dependency analysis, VMware Tools (version 10.2.1 or later) must be installed and running on servers. Windows servers must have PowerShell version 2.0 or later installed.<br /><br /> To discover SQL Server instances and databases, check [supported SQL Server and Windows OS versions and editions](migrate-support-matrix-vmware.md?pivots=sql-server-instance-database-discovery-requirements&tabs=businesscase) and Windows authentication mechanisms.<br /><br /> To discover ASP.NET web apps running on IIS web server, check [supported Windows OS and IIS versions](migrate-support-matrix-vmware.md?pivots=web-apps-discovery&tabs=businesscase).<br /><br /> To discover Java web apps running on Apache Tomcat web server, check [supported Linux OS and Tomcat versions](migrate-support-matrix-vmware.md?pivots=web-apps-discovery&tabs=businesscase).
4545
**SQL Server access** | To discover SQL Server instances and databases, the Windows account, or SQL Server account [requires these permissions](migrate-support-matrix-vmware.md?pivots=sql-server-instance-database-discovery-requirements&tabs=businesscase) for each SQL Server instance. You can use the [account provisioning utility](../least-privilege-credentials.md) to create custom accounts or use any existing account that is a member of the sysadmin server role for simplicity.
4646

4747
## Prepare an Azure user account

articles/sentinel/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -402,6 +402,8 @@
402402
href: data-connectors/dynatrace-problems.md
403403
- name: Dynatrace Runtime Vulnerabilities
404404
href: data-connectors/dynatrace-runtime-vulnerabilities.md
405+
- name: ESET Protect Platform (using Azure Functions)
406+
href: data-connectors/eset-protect-platform.md
405407
- name: Elastic Agent (Standalone)
406408
href: data-connectors/elastic-agent-standalone.md
407409
- name: Exchange Security Insights On-Premises Collector

articles/sentinel/data-connectors-reference.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -248,6 +248,10 @@ For more information about the codeless connector platform, see [Create a codele
248248
- [Dynatrace Problems](data-connectors/dynatrace-problems.md)
249249
- [Dynatrace Runtime Vulnerabilities](data-connectors/dynatrace-runtime-vulnerabilities.md)
250250

251+
## ESET
252+
253+
- [ESET Protect Platform (using Azure Functions)](data-connectors/eset-protect-platform.md)
254+
251255
## Elastic
252256

253257
- [Elastic Agent (Standalone)](data-connectors/elastic-agent-standalone.md)
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: "ESET Protect Platform (using Azure Functions) connector for Microsoft Sentinel"
3+
description: "Learn how to install the connector ESET Protect Platform (using Azure Functions) to connect your data source to Microsoft Sentinel."
4+
author: cwatson-cat
5+
ms.topic: how-to
6+
ms.date: 01/21/2025
7+
ms.service: microsoft-sentinel
8+
ms.author: cwatson
9+
ms.collection: sentinel-data-connector
10+
---
11+
12+
# ESET Protect Platform (using Azure Functions) connector for Microsoft Sentinel
13+
14+
The ESET Protect Platform data connector enables users to inject detections data from [ESET Protect Platform](https://www.eset.com/int/business/protect-platform/) using the provided [Integration REST API](https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/ESET%20Protect%20Platform/Data%20Connectors). Integration REST API runs as scheduled Azure Function App.
15+
16+
This is autogenerated content. For changes, contact the solution provider.
17+
18+
## Connector attributes
19+
20+
| Connector attribute | Description |
21+
| --- | --- |
22+
| **Log Analytics table(s)** | IntegrationTable_CL<br/> |
23+
| **Data collection rules support** | Not currently supported |
24+
| **Supported by** | [ESET Enterprise Integrations](https://help.eset.com/eset_connect/en-US/integrations.html) |
25+
26+
## Query samples
27+
28+
**All table records sorted by time**
29+
30+
```kusto
31+
IntegrationTable_CL
32+
33+
| sort by TimeGenerated desc
34+
```
35+
36+
37+
38+
## Prerequisites
39+
40+
To integrate with ESET Protect Platform (using Azure Functions) make sure you have:
41+
42+
- **Microsoft.Web/sites permissions**: Read and write permissions to Azure Functions to create a Function App is required. [See the documentation to learn more about Azure Functions](/azure/azure-functions/).
43+
- **Permission to register an application in Microsoft Entra ID**: Sufficient permissions to register an application with your Microsoft Entra tenant are required.
44+
- **Permission to assign a role to the registered application**: Permission to assign the Monitoring Metrics Publisher role to the registered application in Microsoft Entra ID is required.
45+
46+
47+
## Vendor installation instructions
48+
49+
50+
> [!NOTE]
51+
> The ESET Protect Platform data connector uses Azure Functions to connect to the ESET Protect Platform via Eset Connect API to pull detections logs into Microsoft Sentinel. This process might result in additional data ingestion costs. See details on the [Azure Functions pricing page](https://azure.microsoft.com/pricing/details/functions/).
52+
53+
Step 1 - Create an API user
54+
55+
Use this [instruction](https://help.eset.com/eset_connect/en-US/create_api_user_account.html) to create an ESET Connect API User account with **Login** and **Password**.
56+
57+
Step 2 - Create a registered application
58+
59+
Create a Microsoft Entra ID registered application by following the steps in the [Register a new application instruction.](/entra/identity-platform/quickstart-register-app)
60+
61+
Step 3 - Deploy the ESET Protect Platform data connector using the Azure Resource Manager (ARM) template
62+
63+
64+
65+
1. Click the **Deploy to Azure** button below.
66+
67+
[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-EsetProtectionPlatform-azuredeploy)
68+
69+
2. Select the name of the **Log Analytics workspace** associated with your Microsoft Sentinel. Select the same **Resource Group** as the Resource Group of the Log Analytics workspace.
70+
71+
3. Type the parameters of the registered application in Microsoft Entra ID: **Azure Client ID**, **Azure Client Secret**, **Azure Tenant ID**, **Object ID**. You can find the **Object ID** on Azure Portal by following this path
72+
> Microsoft Entra ID -> Manage (on the left-side menu) -> Enterprise applications -> Object ID column (the value next to your registered application name).
73+
74+
4. Provide the ESET Connect API user account **Login** and **Password** obtained in **Step 1**.
75+
76+
77+
78+
## Next steps
79+
80+
For more information, go to the [related solution](https://azuremarketplace.microsoft.com/en-us/marketplace/apps/esetresearch1579795941720.eset-protect-platform-solution?tab=Overview) in the Azure Marketplace.

articles/service-connector/includes/code-postgres-me-id.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@ For Ruby, there's not a plugin or library for passwordless connections. You can
332332
# res = Net::HTTP.get_response(uri, {'X-IDENTITY-HEADER' => ENV['IDENTITY_HEADER'], 'Metadata' => 'true'})
333333

334334
# For user-assigned identity.
335-
# uri = URI(ENV[IDENTITY_ENDPOINT] + '?resource=https://ossrdbms-aad.database.windows.net&api-version=2019-08-01&client-id=' + ENV['AZURE_POSTGRESQL_CLIENTID'])
335+
# uri = URI(ENV[IDENTITY_ENDPOINT] + '?resource=https://ossrdbms-aad.database.windows.net&api-version=2019-08-01&client_id=' + ENV['AZURE_POSTGRESQL_CLIENTID'])
336336
# res = Net::HTTP.get_response(uri, {'X-IDENTITY-HEADER' => ENV['IDENTITY_HEADER'], 'Metadata' => 'true'})
337337

338338
# For service principal

articles/service-connector/tutorial-python-aks-openai-workload-identity.md

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: service-connector
99
ms.custom: devx-track-python, build-2024, devx-track-azurecli
1010
ms.collection: ce-skilling-ai-copilot
1111
ms.topic: tutorial
12-
ms.date: 05/07/2024
12+
ms.date: 01/22/2025
1313
---
1414

1515
# Tutorial: Connect to Azure OpenAI Service in AKS using Workload Identity (preview)
@@ -148,19 +148,26 @@ Once the connection has been created, you can view its details in the **Service
148148
149149
### [Azure CLI](#tab/azure-cli)
150150
151-
Use the Azure CLI command to create a service connection to the Azure OpenAI service, providing the following information:
152-
153-
* **Source compute service resource group name:** the resource group name of the AKS cluster.
154-
* **AKS cluster name:** the name of your AKS cluster that connects to the target service.
155-
* **Target service resource group name:** the resource group name of the Azure OpenAI service.
156-
* **OpenAI service name:** the Azure OpenAI service that is connected.
157-
* **User-assigned identity resource ID:** the resource ID of the user-assigned identity used to create the workload identity.
151+
Create a service connection in AKS by running the [az aks connection create](/cli/azure/aks/connection/create#az-aks-connection-create-cognitiveservices) command in the Azure CLI.
158152
159153
```azurecli
160154
az aks connection create cognitiveservices \
161155
--workload-identity <user-identity-resource-id>
162156
```
163157

158+
When using the above command, Service Connector prompts you to specify the AKS resource group, AKS cluster name, target service resource group, cognitive service account name, and user-assigned identity resource ID step by step.
159+
160+
Alternatively, you can provide the complete command directly:
161+
162+
```azurecli
163+
az aks connection create cognitiveservices \
164+
--workload-identity <user-identity-resource-id> \
165+
--resource-group <aks-cluster-resource-group> \
166+
--name <aks-cluster-name> \
167+
--target-resource-group <target-cognitive-services-resource-group> \
168+
--account <target-cognitive-services-account>
169+
```
170+
164171
---
165172

166173
## Clone sample application

0 commit comments

Comments
 (0)