Skip to content

Commit e3e6c12

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into vnet-encryption-patch
2 parents ea1adc7 + a632f6d commit e3e6c12

File tree

6 files changed

+91
-37
lines changed

6 files changed

+91
-37
lines changed

articles/api-management/credentials-how-to-azure-ad.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,9 @@ On the **Connection** tab, complete the steps for your connection to the provide
127127
|**URL** for GET | /me/joinedTeams |
128128

129129
1. Select **All operations**. In the **Inbound processing** section, select the (**</>**) (code editor) icon.
130-
1. Make sure the `provider-id` and `authorization-id` values in the `get-authorization-context` policy correspond to the names of the credential provider and connection, respectively, that you configured in the preceding steps. Select **Save**.
130+
1. Copy and paste the following snippet. Update the `get-authorization-context` policy with the names of the credential provider and connection that you configured in the preceding steps, and select **Save**.
131+
* Substitute your credential provider name as the value of `provider-id`
132+
* Substitute your connection name as the value of `authorization-id`
131133

132134
```xml
133135
<policies>

articles/azure-monitor/essentials/metrics-explorer.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: EdB-MSFT
55
ms.service: azure-monitor
66
ms-author: edbaynash
77
ms.topic: conceptual
8-
ms.date: 04/01/2024
8+
ms.date: 04/24/2024
99
ms.reviewer: priyamishra
1010

1111
# Customer intent: As an Azure Monitor user, I want to learn how to use Azure Monitor metrics explorer with PromQL.
@@ -30,9 +30,6 @@ The chart pane has two options for charting a metric:
3030

3131
Adding a chart with the editor allows you to enter a PromQL query to retrieve metrics data. The editor provides syntax highlighting and intellisense for PromQL queries. Currently, queries are limited to the metrics stored in an Azure Monitor workspace. For more information on PromQL, see [Querying Prometheus](https://prometheus.io/docs/prometheus/latest/querying/basics/).
3232

33-
> [!NOTE]
34-
> To write queries in the editor, the workspace must have at least one Azure Kubernetes Service (AKS) cluster or Azure Arc-enabled Kubernetes cluster connected to it.
35-
3633
Adding a chart with the builder allows you to select metrics from any of your Azure resources. The builder provides a list of metrics available in the selected scope. Select the metric, aggregation type, and chart type from the builder. The builder can't be used to chart metrics stored in an Azure Monitor workspace.
3734

3835

articles/expressroute/expressroute-howto-routing-arm.md

Lines changed: 24 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,11 @@ This section helps you create, get, update, and delete the Microsoft peering con
7272
```azurepowershell-interactive
7373
Select-AzSubscription -SubscriptionId "<subscription ID>"
7474
```
75-
1. Create an ExpressRoute circuit.
75+
2. Create an ExpressRoute circuit.
7676

7777
Follow the instructions to create an [ExpressRoute circuit](expressroute-howto-circuit-arm.md) and have it provisioned by the connectivity provider. If your connectivity provider offers managed Layer 3 services, you can ask your connectivity provider to enable Microsoft peering for you. You won't need to follow instructions listed in the next sections. However, if your connectivity provider doesn't manage routing for you, after creating your circuit, continue your configuration using the next steps.
7878

79-
1. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
79+
3. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
8080

8181
```azurepowershell-interactive
8282
Get-AzExpressRouteCircuit -Name "ExpressRouteARMCircuit" -ResourceGroupName "ExpressRouteResourceGroup"
@@ -107,17 +107,21 @@ This section helps you create, get, update, and delete the Microsoft peering con
107107
ServiceKey : **************************************
108108
Peerings : []
109109
```
110-
1. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
110+
4. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
111111

112-
* A /30 or /126 subnet for the primary link. The address block must be a valid public IPv4 or IPv6 prefix owned by you and registered in an RIR / IRR.
113-
* A /30 or /126 subnet for the secondary link. The address block must be a valid public IPv4 or IPv6 prefix owned by you and registered in an RIR / IRR.
114-
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID.
112+
* A pair of subnets owned by you and registered in an RIR/IRR. One subnet is used for the primary link, while the other will be used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
113+
* IPv4: Two /30 subnets. These must be valid public IPv4 prefixes.
114+
* IPv6: Two /126 subnets. These must be valid public IPv6 prefixes.
115+
* Both: Two /30 subnets and two /126 subnets.
116+
* Microsoft peering enables you to communicate with the public IP addresses on Microsoft network. So, your traffic endpoints on your on-premises network should be public too. This is often done using SNAT.
117+
> [!NOTE]
118+
> When using SNAT, we advise against a public IP address from the range assigned to primary or secondary link. Instead, you should use a different range of public IP addresses that has been assigned to you and registered in a Regional Internet Registry (RIR) or Internet Routing Registry (IRR). Depending on your call volume, this range can be as small as a single IP address (represented as '/32' for IPv4 or '/128' for IPv6).
119+
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.
115120
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.
116-
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR. IPv4 BGP sessions require IPv4 advertised prefixes and IPv6 BGP sessions require IPv6 advertised prefixes.
121+
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
122+
* **Optional -** Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
117123
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
118-
* Optional:
119-
* Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
120-
* An MD5 hash if you choose to use one.
124+
* **Optional -** An MD5 hash if you choose to use one.
121125

122126
> [!IMPORTANT]
123127
> Microsoft verifies if the specified 'Advertised public prefixes' and 'Peer ASN' (or 'Customer ASN') are assigned to you in the Internet Routing Registry. If you are getting the public prefixes from another entity and if the assignment is not recorded with the routing registry, the automatic validation will not complete and will require manual validation. If the automatic validation fails, you will see 'AdvertisedPublicPrefixesState' as 'Validation needed' on the output of "Get-AzExpressRouteCircuitPeeringConfig" (see "To get Microsoft peering details" in the following section).
@@ -194,11 +198,11 @@ This section helps you create, get, update, and delete the Azure private peering
194198
```azurepowershell-interactive
195199
Select-AzSubscription -SubscriptionId "<subscription ID>"
196200
```
197-
1. Create an ExpressRoute circuit.
201+
2. Create an ExpressRoute circuit.
198202

199203
Follow the instructions to create an [ExpressRoute circuit](expressroute-howto-circuit-arm.md) and have it provisioned by the connectivity provider. If your connectivity provider offers managed Layer 3 services, you can ask your connectivity provider to enable Azure private peering for you. You won't need to follow instructions listed in the next sections. However, if your connectivity provider doesn't manage routing for you, after creating your circuit, continue your configuration using the next steps.
200204

201-
1. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
205+
3. Check the ExpressRoute circuit to make sure it's provisioned and also enabled. Use the following example:
202206

203207
```azurepowershell-interactive
204208
Get-AzExpressRouteCircuit -Name "ExpressRouteARMCircuit" -ResourceGroupName "ExpressRouteResourceGroup"
@@ -229,21 +233,16 @@ This section helps you create, get, update, and delete the Azure private peering
229233
ServiceKey : **************************************
230234
Peerings : []
231235
```
232-
1. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
236+
4. Configure Azure private peering for the circuit. Make sure that you have the following items before you continue with the next steps:
233237

234-
* A pair of subnets owned by you and registered in an RIR/IRR. One subnet is used for the primary link, while the other will be used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
235-
* IPv4: Two /30 subnets. These must be valid public IPv4 prefixes.
236-
* IPv6: Two /126 subnets. These must be valid public IPv6 prefixes.
238+
* A pair of subnets that aren't part of any address space reserved for virtual networks. One subnet is used for the primary link, while the other is used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
239+
* IPv4: Two /30 subnets.
240+
* IPv6: Two /126 subnets.
237241
* Both: Two /30 subnets and two /126 subnets.
238-
* Microsoft peering enables you to communicate with the public IP addresses on Microsoft network. So, your traffic endpoints on your on-premises network should be public too. This is often done using SNAT.
239-
> [!NOTE]
240-
> When using SNAT, we advise against a public IP address from the range assigned to primary or secondary link. Instead, you should use a different range of public IP addresses that has been assigned to you and registered in a Regional Internet Registry (RIR) or Internet Routing Registry (IRR). Depending on your call volume, this range can be as small as a single IP address (represented as '/32' for IPv4 or '/128' for IPv6).
241-
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.
242-
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.
243-
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
244-
* **Optional -** Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
245-
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
246-
* **Optional -** An MD5 hash if you choose to use one.
242+
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID.
243+
* AS number for peering. You can use both 2-byte and 4-byte AS numbers. You can use a private AS number for this peering. Ensure that you aren't using 65515.
244+
* Optional:
245+
* An MD5 hash if you choose to use one.
247246

248247
Use the following example to configure Azure private peering for your circuit:
249248

articles/expressroute/howto-routing-cli.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: expressroute
55
author: duongau
66
ms.service: expressroute
77
ms.topic: how-to
8-
ms.date: 09/15/2023
8+
ms.date: 04/22/2024
99
ms.author: duau
1010
ms.custom: devx-track-azurecli
1111
---
@@ -98,12 +98,17 @@ This section helps you create, get, update, and delete the Microsoft peering con
9898

9999
4. Configure Microsoft peering for the circuit. Make sure that you have the following information before you continue.
100100

101-
* A /30 subnet for the primary link. The address block must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR.
102-
* A /30 subnet for the secondary link. The address block must be a valid public IPv4 prefix owned by you and registered in an RIR / IRR.
103-
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID.
101+
* A pair of subnets owned by you and registered in an RIR/IRR. One subnet is used for the primary link, while the other will be used for the secondary link. From each of these subnets, you assign the first usable IP address to your router as Microsoft uses the second usable IP for its router. You have three options for this pair of subnets:
102+
* IPv4: Two /30 subnets. These must be valid public IPv4 prefixes.
103+
* IPv6: Two /126 subnets. These must be valid public IPv6 prefixes.
104+
* Both: Two /30 subnets and two /126 subnets.
105+
* Microsoft peering enables you to communicate with the public IP addresses on Microsoft network. So, your traffic endpoints on your on-premises network should be public too. This is often done using SNAT.
106+
> [!NOTE]
107+
> When using SNAT, we advise against a public IP address from the range assigned to primary or secondary link. Instead, you should use a different range of public IP addresses that has been assigned to you and registered in a Regional Internet Registry (RIR) or Internet Routing Registry (IRR). Depending on your call volume, this range can be as small as a single IP address (represented as '/32' for IPv4 or '/128' for IPv6).
108+
* A valid VLAN ID to establish this peering on. Ensure that no other peering in the circuit uses the same VLAN ID. For both Primary and Secondary links you must use the same VLAN ID.
104109
* AS number for peering. You can use both 2-byte and 4-byte AS numbers.
105-
* Advertised prefixes: Provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
106-
* **Optional -** Customer ASN: If you're advertising prefixes that are not registered to the peering AS number, you can specify the AS number to which they're registered with.
110+
* Advertised prefixes: You provide a list of all prefixes you plan to advertise over the BGP session. Only public IP address prefixes are accepted. If you plan to send a set of prefixes, you can send a comma-separated list. These prefixes must be registered to you in an RIR / IRR.
111+
* **Optional -** Customer ASN: If you're advertising prefixes not registered to the peering AS number, you can specify the AS number to which they're registered with.
107112
* Routing Registry Name: You can specify the RIR / IRR against which the AS number and prefixes are registered.
108113
* **Optional -** An MD5 hash if you choose to use one.
109114

articles/iot-edge/how-to-provision-devices-at-scale-linux-tpm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ nano ~/config.toml
257257
[provisioning]
258258
source = "dps"
259259
global_endpoint = "https://global.azure-devices-provisioning.net"
260-
id_scope = "SCOPE_ID_HERE"
260+
id_scope = "DPS_ID_SCOPE_HERE"
261261

262262
# Uncomment to send a custom payload during DPS registration
263263
# payload = { uri = "PATH_TO_JSON_FILE" }

articles/logic-apps/connectors/sap.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1170,6 +1170,57 @@ You can control this tracing capability at the application level by adding the f
11701170
> If you download a log or trace file that your logic app workflow opened
11711171
> and is currently in use, your download might result in an empty file.
11721172

1173+
## Enable SAP Common Crypto Library (CCL) tracing (built-in connector only)
1174+
1175+
If you have to investigate any problems with the crypto library while using SNC authentication, you can set up custom text file-based CCL tracing. You can use these CCL logs to troubleshoot SNC authentication issues, or share them with Microsoft or SAP support, if requested. By default, this capability is disabled because enabling this trace might negatively affect performance and quickly consume the application host's storage space.
1176+
1177+
You can control this tracing capability at the application level by adding the following settings:
1178+
1179+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
1180+
1181+
1. On Standard logic app resource menu, under **Development Tools**, select **Advanced Tools** > **Go**.
1182+
1183+
1. On the **Kudu** toolbar, select **Debug Console** > **CMD**.
1184+
1185+
1. Browse to a location under **C:\home\site\wwwroot**, and create a text file, for example: **CCLPROFILE.txt**.
1186+
1187+
For more information about logging parameters, see [**Tracing** > SAP NOTE 2338952](https://me.sap.com/notes/2338952/E). The following sample provides an example tracing configuration:
1188+
1189+
```
1190+
ccl/trace/directory=C:\home\LogFiles\CCLLOGS
1191+
ccl/trace/level=4
1192+
ccl/trace/rotatefilesize=10000000
1193+
ccl/trace/rotatefilenumber=10
1194+
```
1195+
1196+
1. On the logic app menu, under **Settings**, select **Environment variables** to review the application settings.
1197+
1198+
1. On the **Environment variables** page, on the **App settings** tab, add the following application setting:
1199+
1200+
**CCL_PROFILE**: The directory where **CCLPROFILE.txt** was created, for example, **C:\home\site\wwwroot\CCLPROFILE.txt**.
1201+
1202+
1. Save your changes. This step restarts the application.
1203+
1204+
### View the trace
1205+
1206+
1. On Standard logic app resource menu, under **Development Tools**, select **Advanced Tools** > **Go**.
1207+
1208+
1. On the **Kudu** toolbar, select **Debug Console** > **CMD**.
1209+
1210+
1. Browse to the folder for the parameter named **$ccl/trace/directory** from **CCLPROFILE.txt**.
1211+
1212+
Usually, the trace files are named **sec-Microsoft.Azure.Work-$processId.trc** and **sec-sapgenpse.exe-$processId.trc**.
1213+
1214+
Your logic app workflow performs SNC authentication as a two-step process:
1215+
1216+
1. Your logic app workflow invokes **sapgenpse.exe** to generate a **cred_v2** file from the PSE file.
1217+
1218+
You can find the traces related to this step in a file named **sec-sapgenpse.exe-$processId.trc**.
1219+
1220+
1. Your logic app workflow authenticates access to your SAP server by consuming the generated **cred_v2** file, with the SAP client library invoking the common crypto library.
1221+
1222+
You can find the traces related to this step in a file named **sec-Microsoft.Azure.Work-$processId.trc**.
1223+
11731224
## Send SAP telemetry for on-premises data gateway to Azure Application Insights
11741225
11751226
With the August 2021 update for the on-premises data gateway, SAP connector operations can send telemetry data from the SAP NCo client library and traces from the Microsoft SAP Adapter to [Application Insights](../../azure-monitor/app/app-insights-overview.md), which is a capability in Azure Monitor. This telemetry primarily includes the following data:

0 commit comments

Comments
 (0)