Skip to content

Commit f24666c

Browse files
authored
Merge branch 'MicrosoftDocs:main' into krkutser-italy-fix
2 parents 0ffed01 + 1e80845 commit f24666c

24 files changed

+210
-755
lines changed
18.2 KB
Loading

articles/azure-app-configuration/pull-key-value-devops-pipeline.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,19 @@ The [Azure App Configuration](https://marketplace.visualstudio.com/items?itemNam
2727

2828
## Add role assignment
2929

30-
[!INCLUDE [azure-app-configuration-role-assignment](../../includes/azure-app-configuration-role-assignment.md)]
30+
Assign the proper App Configuration role assignments to the credentials being used within the task so that the task can access the App Configuration store.
31+
32+
1. Go to your target App Configuration store.
33+
1. In the left menu, select **Access control (IAM)**.
34+
1. In the right pane, select **Add role assignments**.
35+
36+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
37+
1. For **Role**, select **App Configuration Data Reader**. This role allows the task to read from the App Configuration store.
38+
1. Select the service principal associated with the service connection that you created in the previous section.
39+
40+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-reader.png" alt-text="Screenshot shows the Add role assignment dialog.":::
41+
1. Select **Review + assign**.
42+
1. If the store contains Key Vault references, go to relevant Key Vault and assign **Key Vault Secret User** role to the service principal created in the previous step. From the Key Vault menu, select **Access policies** and ensure [Azure role-based access control](../key-vault/general/rbac-guide.md) is selected as the permission model.
3143

3244
## Use in builds
3345

articles/azure-app-configuration/push-kv-devops-pipeline.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,18 @@ The [Azure App Configuration Push](https://marketplace.visualstudio.com/items?it
2727

2828
## Add role assignment
2929

30-
[!INCLUDE [azure-app-configuration-role-assignment](../../includes/azure-app-configuration-role-assignment.md)]
30+
Assign the proper App Configuration role assignments to the credentials being used within the task so that the task can access the App Configuration store.
31+
32+
1. Go to your target App Configuration store.
33+
1. In the left menu, select **Access control (IAM)**.
34+
1. In the right pane, select **Add role assignments**.
35+
36+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-button.png" alt-text="Screenshot shows the Add role assignments button.":::
37+
1. For **Role**, select **App Configuration Data Owner**. This role allows the task to read from and write to the App Configuration store.
38+
1. Select the service principal associated with the service connection that you created in the previous section.
39+
40+
:::image type="content" border="true" source="./media/azure-app-configuration-role-assignment/add-role-assignment-data-owner.png" alt-text="Screenshot shows the Add role assignment dialog.":::
41+
1. Select **Review + assign**.
3142

3243
## Use in builds
3344

@@ -50,7 +61,7 @@ This section will cover how to use the Azure App Configuration Push task in an A
5061

5162
## Use in releases
5263

53-
This section will cover how to use the Azure App Configuration Push task in an Azure DevOps release pipelines.
64+
This section will cover how to use the Azure App Configuration Push task in an Azure DevOps release pipeline.
5465

5566
1. Navigate to release pipeline page by selecting **Pipelines** > **Releases**. Documentation for release pipelines can be found [here](/azure/devops/pipelines/release).
5667
1. Choose an existing release pipeline. If you don’t have one, select **+ New** to create a new one.
@@ -111,4 +122,4 @@ Depending on the file content profile you selected, please refer to examples in
111122

112123
**Why am I receiving a 409 error when attempting to push key-values to my configuration store?**
113124

114-
A 409 Conflict error message will occur if the task tries to remove or overwrite a key-value that is locked in the App Configuration store.
125+
A 409 Conflict error message will occur if the task tries to remove or overwrite a key-value that is locked in the App Configuration store.

articles/azure-monitor/agents/gateway.md

Lines changed: 3 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -95,22 +95,7 @@ The following table shows approximately how many agents can communicate with a g
9595

9696
## Download the Log Analytics gateway
9797

98-
Get the latest version of the Log Analytics gateway Setup file from either Microsoft Download Center ([Download Link](https://go.microsoft.com/fwlink/?linkid=837444)) or the Azure portal.
99-
100-
To get the Log Analytics gateway from the Azure portal, follow these steps:
101-
102-
1. Browse the list of services, and then select **Log Analytics**.
103-
1. Select a workspace.
104-
1. In your workspace pane, from the pane on the left, under **General**, select **Quick Start**.
105-
1. Under **Choose a data source to connect to the workspace**, select **Computers**.
106-
1. In the **Direct Agent** pane, select **Download Log Analytics gateway**.
107-
108-
![Screenshot of the steps to download the Log Analytics gateway](./media/gateway/download-gateway.png)
109-
110-
or
111-
112-
1. In your workspace pane, from the pane on the left, under **Settings**, select **Advanced settings**.
113-
1. Go to **Connected Sources** > **Windows Servers** and select **Download Log Analytics gateway**.
98+
Get the latest version of the Log Analytics gateway Setup file from Microsoft Download Center ([Download Link](https://go.microsoft.com/fwlink/?linkid=837444)).
11499

115100
## Install Log Analytics gateway using setup wizard
116101

@@ -212,11 +197,11 @@ After the load balancer is created, a backend pool needs to be created, which di
212197

213198
To configure the Azure Monitor agent (installed on the gateway server) to use the gateway to upload data for Windows or Linux:
214199
1. Follow the instructions to [configure proxy settings on the agent](./azure-monitor-agent-overview.md#proxy-configuration) and provide the IP address and port number corresponding to the gateway server. If you have deployed multiple gateway servers behind a load balancer, the agent proxy configuration is the virtual IP address of the load balancer instead.
215-
2. Add the **configuration endpoint URL** to fetch data collection rules to the allow list for the gateway
200+
2. Add the **configuration endpoint URL** to fetch data collection rules to the allowlist for the gateway
216201
`Add-OMSGatewayAllowedHost -Host global.handler.control.monitor.azure.com`
217202
`Add-OMSGatewayAllowedHost -Host <gateway-server-region-name>.handler.control.monitor.azure.com`
218203
(If using private links on the agent, you must also add the [dce endpoints](../essentials/data-collection-endpoint-overview.md#components-of-a-data-collection-endpoint))
219-
3. Add the **data ingestion endpoint URL** to the allow list for the gateway
204+
3. Add the **data ingestion endpoint URL** to the allowlist for the gateway
220205
`Add-OMSGatewayAllowedHost -Host <log-analytics-workspace-id>.ods.opinsights.azure.com`
221206
3. Restart the **OMS Gateway** service to apply the changes
222207
`Stop-Service -Name <gateway-name>`
Binary file not shown.

articles/azure-monitor/logs/create-custom-table.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ To create a custom table, you need:
3333
```
3434

3535
For information about the `TimeGenerated` format, see [supported datetime formats](/azure/data-explorer/kusto/query/scalar-data-types/datetime#supported-formats).
36+
3637
## Create a custom table
3738

3839
Azure tables have predefined schemas. To store log data in a different schema, use data collection rules to define how to collect, transform, and send the data to a custom table in your Log Analytics workspace.
@@ -181,6 +182,10 @@ To delete a table using PowerShell:
181182
## Add or delete a custom column
182183

183184
You can modify the schema of custom tables and add custom columns to, or delete columns from, a standard table.
185+
186+
> [!NOTE]
187+
> Column names must start with a letter and can consist of up to 45 alphanumeric characters and the characters `_` and `-`. The following are reserved column names: `Type`, `TenantId`, `resource`, `resourceid`, `resourcename`, `resourcetype`, `subscriptionid`, `tenanted`.
188+
184189
# [Portal](#tab/azure-portal-3)
185190

186191
To add a custom column to a table in your Log Analytics workspace, or delete a column:

articles/azure-monitor/logs/logs-ingestion-api-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.date: 06/27/2022
88

99
# Logs Ingestion API in Azure Monitor
1010

11-
The Logs Ingestion API in Azure Monitor lets you send data to a Log Analytics workspace from any REST API client. By using this API, you can send data from almost any source to [supported built-in tables](#supported-tables) or to custom tables that you create. You can even extend the schema of built-in tables with custom columns.
11+
The Logs Ingestion API in Azure Monitor lets you send data to a Log Analytics workspace from any REST API client. By using this API, you can send data from almost any source to [supported Azure tables](#supported-tables) or to [custom tables that you create](../logs/create-custom-table.md#create-a-custom-table). You can even [extend the schema of Azure tables with custom columns](../logs/create-custom-table.md#add-or-delete-a-custom-column).
1212

1313
> [!NOTE]
1414
> The Logs Ingestion API was previously referred to as the custom logs API.
@@ -32,19 +32,19 @@ You can modify the target table and workspace by modifying the DCR without any c
3232

3333
### Custom tables
3434

35-
The Logs Ingestion API can send data to any custom table that you create and to certain built-in tables in your Log Analytics workspace. The target table must exist before you can send data to it. Custom tables must have the `_CL` suffix.
35+
The Logs Ingestion API can send data to any custom table that you create and to certain Azure tables in your Log Analytics workspace. The target table must exist before you can send data to it. Custom tables must have the `_CL` suffix.
3636

37-
### Built-in tables
37+
### Azure tables
3838

39-
The Logs Ingestion API can send data to the following built-in tables. Other tables may be added to this list as support for them is implemented. Columns extended on top of built-in tables must have the suffix `_CF`. Columns in a custom table don't need this suffix.
39+
The Logs Ingestion API can send data to the following Azure tables. Other tables may be added to this list as support for them is implemented.
4040

4141
- [CommonSecurityLog](/azure/azure-monitor/reference/tables/commonsecuritylog)
4242
- [SecurityEvents](/azure/azure-monitor/reference/tables/securityevent)
4343
- [Syslog](/azure/azure-monitor/reference/tables/syslog)
4444
- [WindowsEvents](/azure/azure-monitor/reference/tables/windowsevent)
4545

4646
> [!NOTE]
47-
> Column names can consist of alphanumeric characters and the characters `_` and `-`, and they must start with a letter.
47+
> Column names must start with a letter and can consist of up to 45 alphanumeric characters and the characters `_` and `-`. The following are reserved column names: `Type`, `TenantId`, `resource`, `resourceid`, `resourcename`, `resourcetype`, `subscriptionid`, `tenanted`. Custom columns you add to an Azure table must have the suffix `_CF`.
4848
4949
## Authentication
5050

articles/azure-resource-manager/management/overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Azure Resource Manager overview
33
description: Describes how to use Azure Resource Manager for deployment, management, and access control of resources on Azure.
44
ms.topic: overview
5-
ms.date: 10/05/2022
5+
ms.date: 02/28/2023
66
ms.custom: contperf-fy21q1,contperf-fy21q3-portal
77
---
88
# What is Azure Resource Manager?
@@ -86,6 +86,8 @@ There are some important factors to consider when defining your resource group:
8686
You may be wondering, "Why does a resource group need a location? And, if the resources can have different locations than the resource group, why does the resource group location matter at all?"
8787

8888
The resource group stores metadata about the resources. When you specify a location for the resource group, you're specifying where that metadata is stored. For compliance reasons, you may need to ensure that your data is stored in a particular region.
89+
90+
To ensure state consistency for the resource group, all [control plane operations](./control-plane-and-data-plane.md) are routed through the resource group's location. When selecting a resource group location, we recommend that you select a location close to where your control operations originate. Typically, this location is the one closest to your current location. This routing requirement only applies to control plane operations for the resource group. It doesn't affect requests that are sent to your applications.
8991

9092
If a resource group's region is temporarily unavailable, you can't update resources in the resource group because the metadata is unavailable. The resources in other regions will still function as expected, but you can't update them. This condition doesn't apply to global resources like Azure Content Delivery Network, Azure DNS, Azure DNS Private Zones, Azure Traffic Manager, and Azure Front Door.
9193

0 commit comments

Comments
 (0)