You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/credentials-how-to-azure-ad.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -127,7 +127,9 @@ On the **Connection** tab, complete the steps for your connection to the provide
127
127
|**URL** for GET | /me/joinedTeams |
128
128
129
129
1. Select **All operations**. In the **Inbound processing** section, select the (**</>**) (code editor) icon.
130
-
1. Make sure the `provider-id` and `authorization-id` values in the `get-authorization-context` policy correspond to the names of the credential provider and connection, respectively, that you configured in the preceding steps. Select **Save**.
130
+
1. Copy and paste the following snippet. Update the `get-authorization-context` policy with the names of the credential provider and connection that you configured in the preceding steps, and select **Save**.
131
+
* Substitute your credential provider name as the value of `provider-id`
132
+
* Substitute your connection name as the value of `authorization-id`
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/metrics-explorer.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: EdB-MSFT
5
5
ms.service: azure-monitor
6
6
ms-author: edbaynash
7
7
ms.topic: conceptual
8
-
ms.date: 04/01/2024
8
+
ms.date: 04/24/2024
9
9
ms.reviewer: priyamishra
10
10
11
11
# Customer intent: As an Azure Monitor user, I want to learn how to use Azure Monitor metrics explorer with PromQL.
@@ -30,9 +30,6 @@ The chart pane has two options for charting a metric:
30
30
31
31
Adding a chart with the editor allows you to enter a PromQL query to retrieve metrics data. The editor provides syntax highlighting and intellisense for PromQL queries. Currently, queries are limited to the metrics stored in an Azure Monitor workspace. For more information on PromQL, see [Querying Prometheus](https://prometheus.io/docs/prometheus/latest/querying/basics/).
32
32
33
-
> [!NOTE]
34
-
> To write queries in the editor, the workspace must have at least one Azure Kubernetes Service (AKS) cluster or Azure Arc-enabled Kubernetes cluster connected to it.
35
-
36
33
Adding a chart with the builder allows you to select metrics from any of your Azure resources. The builder provides a list of metrics available in the selected scope. Select the metric, aggregation type, and chart type from the builder. The builder can't be used to chart metrics stored in an Azure Monitor workspace.
Follow the instructions to create an [ExpressRoute circuit](expressroute-howto-circuit-arm.md) and have it provisioned by the connectivity provider. If your connectivity provider offers managed Layer 3 services, you can ask your connectivity provider to enable Microsoft peering for you. You won't need to follow instructions listed in the next sections. However, if your connectivity provider doesn't manage routing for you, after creating your circuit, continue your configuration using the next steps.
78
78
79
-
1. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
79
+
3. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
1. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
110
+
4. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
111
111
112
-
* A /30 or /126 subnet for the primary link. The address block must be a valid public IPv4 or IPv6 prefix owned by you and registered in an RIR / IRR.
113
-
* A /30 or /126 subnet for the secondary link. The address block must be a valid public IPv4 or IPv6 prefix owned by you and registered in an RIR / IRR.
114
-
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID.
112
+
* A pair of subnets owned by you and registered in an RIR/IRR. One subnet is used for the primary link, while the other will be used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
113
+
* IPv4: Two /30 subnets. These must be valid public IPv4 prefixes.
114
+
* IPv6: Two /126 subnets. These must be valid public IPv6 prefixes.
115
+
* Both: Two /30 subnets and two /126 subnets.
116
+
* Microsoft peering enables you to communicate with the public IP addresses on Microsoft network. So, your traffic endpoints on your on-premises network should be public too. This is often done using SNAT.
117
+
> [!NOTE]
118
+
> When using SNAT, we advise against a public IP address from the range assigned to primary or secondary link. Instead, you should use a different range of public IP addresses that has been assigned to you and registered in a Regional Internet Registry (RIR) or Internet Routing Registry (IRR). Depending on your call volume, this range can be as small as a single IP address (represented as '/32' for IPv4 or '/128' for IPv6).
119
+
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.
115
120
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.
116
-
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR. IPv4 BGP sessions require IPv4 advertised prefixes and IPv6 BGP sessions require IPv6 advertised prefixes.
121
+
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
122
+
***Optional -** Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
117
123
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
118
-
* Optional:
119
-
* Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
120
-
* An MD5 hash if you choose to use one.
124
+
***Optional -** An MD5 hash if you choose to use one.
121
125
122
126
> [!IMPORTANT]
123
127
> Microsoft verifies if the specified 'Advertised public prefixes' and 'Peer ASN' (or 'Customer ASN') are assigned to you in the Internet Routing Registry. If you are getting the public prefixes from another entity and if the assignment is not recorded with the routing registry, the automatic validation will not complete and will require manual validation. If the automatic validation fails, you will see 'AdvertisedPublicPrefixesState' as 'Validation needed' on the output of "Get-AzExpressRouteCircuitPeeringConfig" (see "To get Microsoft peering details" in the following section).
@@ -194,11 +198,11 @@ This section helps you create, get, update, and delete the Azure private peering
Follow the instructions to create an [ExpressRoute circuit](expressroute-howto-circuit-arm.md) and have it provisioned by the connectivity provider. If your connectivity provider offers managed Layer 3 services, you can ask your connectivity provider to enable Azure private peering for you. You won't need to follow instructions listed in the next sections. However, if your connectivity provider doesn't manage routing for you, after creating your circuit, continue your configuration using the next steps.
200
204
201
-
1. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
205
+
3. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
1. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
236
+
4. Configure Azure private peering for the circuit. Make sure that you have the following items before you continue with the next steps:
233
237
234
-
* A pair of subnets owned by you and registered in an RIR/IRR. One subnet is used for the primary link, while the other will be used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
235
-
* IPv4: Two /30 subnets. These must be valid public IPv4 prefixes.
236
-
* IPv6: Two /126 subnets. These must be valid public IPv6 prefixes.
238
+
* A pair of subnets that aren't part of any address space reserved for virtual networks. One subnet is used for the primary link, while the other is used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
239
+
* IPv4: Two /30 subnets.
240
+
* IPv6: Two /126 subnets.
237
241
* Both: Two /30 subnets and two /126 subnets.
238
-
* Microsoft peering enables you to communicate with the public IP addresses on Microsoft network. So, your traffic endpoints on your on-premises network should be public too. This is often done using SNAT.
239
-
> [!NOTE]
240
-
> When using SNAT, we advise against a public IP address from the range assigned to primary or secondary link. Instead, you should use a different range of public IP addresses that has been assigned to you and registered in a Regional Internet Registry (RIR) or Internet Routing Registry (IRR). Depending on your call volume, this range can be as small as a single IP address (represented as '/32' for IPv4 or '/128' for IPv6).
241
-
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.
242
-
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.
243
-
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
244
-
***Optional -** Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
245
-
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
246
-
***Optional -** An MD5 hash if you choose to use one.
242
+
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID.
243
+
* AS number for peering. You can use both 2-byte and 4-byte AS numbers. You can use a private AS number for this peering. Ensure that you aren't using 65515.
244
+
* Optional:
245
+
* An MD5 hash if you choose to use one.
247
246
248
247
Use the following example to configure Azure private peering for your circuit:
Copy file name to clipboardExpand all lines: articles/expressroute/howto-routing-cli.md
+11-6Lines changed: 11 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: expressroute
5
5
author: duongau
6
6
ms.service: expressroute
7
7
ms.topic: how-to
8
-
ms.date: 09/15/2023
8
+
ms.date: 04/22/2024
9
9
ms.author: duau
10
10
ms.custom: devx-track-azurecli
11
11
---
@@ -98,12 +98,17 @@ This section helps you create, get, update, and delete the Microsoft peering con
98
98
99
99
4. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
100
100
101
-
* A /30 subnet for the primary link. The address block must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR.
102
-
* A /30 subnet for the secondary link. The address block must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR.
103
-
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID.
101
+
* A pair of subnets owned by you and registered in an RIR/IRR. One subnet is used for the primary link, while the other will be used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
102
+
* IPv4: Two /30 subnets. These must be valid public IPv4 prefixes.
103
+
* IPv6: Two /126 subnets. These must be valid public IPv6 prefixes.
104
+
* Both: Two /30 subnets and two /126 subnets.
105
+
* Microsoft peering enables you to communicate with the public IP addresses on Microsoft network. So, your traffic endpoints on your on-premises network should be public too. This is often done using SNAT.
106
+
> [!NOTE]
107
+
> When using SNAT, we advise against a public IP address from the range assigned to primary or secondary link. Instead, you should use a different range of public IP addresses that has been assigned to you and registered in a Regional Internet Registry (RIR) or Internet Routing Registry (IRR). Depending on your call volume, this range can be as small as a single IP address (represented as '/32' for IPv4 or '/128' for IPv6).
108
+
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.
104
109
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.
105
-
* Advertised prefixes: Provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
106
-
***Optional -** Customer ASN: If you're advertising prefixes that are not registered to the peering AS number, you can specify the AS number to which they're registered with.
110
+
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
111
+
***Optional -** Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
107
112
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
108
113
***Optional -** An MD5 hash if you choose to use one.
Copy file name to clipboardExpand all lines: articles/logic-apps/connectors/sap.md
+51Lines changed: 51 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1170,6 +1170,57 @@ You can control this tracing capability at the application level by adding the f
1170
1170
> If you download a log or trace file that your logic app workflow opened
1171
1171
> and is currently in use, your download might result in an empty file.
1172
1172
1173
+
## Enable SAP Common Crypto Library (CCL) tracing (built-in connector only)
1174
+
1175
+
If you have to investigate any problems with the crypto library while using SNC authentication, you can set up custom text file-based CCL tracing. You can use these CCL logs to troubleshoot SNC authentication issues, or share them with Microsoft or SAP support, if requested. By default, this capability is disabled because enabling this trace might negatively affect performance and quickly consume the application host's storage space.
1176
+
1177
+
You can control this tracing capability at the application level by adding the following settings:
1178
+
1179
+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
1180
+
1181
+
1. On Standard logic app resource menu, under **Development Tools**, select **Advanced Tools** > **Go**.
1182
+
1183
+
1. On the **Kudu** toolbar, select **Debug Console** > **CMD**.
1184
+
1185
+
1. Browse to a location under **C:\home\site\wwwroot**, and create a text file, for example: **CCLPROFILE.txt**.
1186
+
1187
+
For more information about logging parameters, see [**Tracing** > SAP NOTE 2338952](https://me.sap.com/notes/2338952/E). The following sample provides an example tracing configuration:
1188
+
1189
+
```
1190
+
ccl/trace/directory=C:\home\LogFiles\CCLLOGS
1191
+
ccl/trace/level=4
1192
+
ccl/trace/rotatefilesize=10000000
1193
+
ccl/trace/rotatefilenumber=10
1194
+
```
1195
+
1196
+
1. On the logic app menu, under **Settings**, select **Environment variables** to review the application settings.
1197
+
1198
+
1. On the **Environment variables** page, on the **App settings** tab, add the following application setting:
1199
+
1200
+
**CCL_PROFILE**: The directory where **CCLPROFILE.txt** was created, for example, **C:\home\site\wwwroot\CCLPROFILE.txt**.
1201
+
1202
+
1. Save your changes. This step restarts the application.
1203
+
1204
+
### View the trace
1205
+
1206
+
1. On Standard logic app resource menu, under **Development Tools**, select **Advanced Tools** > **Go**.
1207
+
1208
+
1. On the **Kudu** toolbar, select **Debug Console** > **CMD**.
1209
+
1210
+
1. Browse to the folder for the parameter named **$ccl/trace/directory** from **CCLPROFILE.txt**.
1211
+
1212
+
Usually, the trace files are named **sec-Microsoft.Azure.Work-$processId.trc** and **sec-sapgenpse.exe-$processId.trc**.
1213
+
1214
+
Your logic app workflow performs SNC authentication as a two-step process:
1215
+
1216
+
1. Your logic app workflow invokes **sapgenpse.exe** to generate a **cred_v2** file from the PSE file.
1217
+
1218
+
You can find the traces related to this step in a file named **sec-sapgenpse.exe-$processId.trc**.
1219
+
1220
+
1. Your logic app workflow authenticates access to your SAP server by consuming the generated **cred_v2** file, with the SAP client library invoking the common crypto library.
1221
+
1222
+
You can find the traces related to this step in a file named **sec-Microsoft.Azure.Work-$processId.trc**.
1223
+
1173
1224
## Send SAP telemetry for on-premises data gateway to Azure Application Insights
1174
1225
1175
1226
With the August 2021 update for the on-premises data gateway, SAP connector operations can send telemetry data from the SAP NCo client library and traces from the Microsoft SAP Adapter to [Application Insights](../../azure-monitor/app/app-insights-overview.md), which is a capability in Azure Monitor. This telemetry primarily includes the following data:
0 commit comments