Skip to content

Commit f34163c

Browse files
committed
Moving AzMon IP Address info article
1 parent fea3ed0 commit f34163c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/azure-monitor/ip-addresses.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Application Insights Agent configuration is needed only when you're making chang
5656
This is the list of addresses from which [availability web tests](./app/availability-overview.md) are run. If you want to run web tests on your app but your web server is restricted to serving specific clients, you'll have to permit incoming traffic from our availability test servers.
5757

5858
> [!NOTE]
59-
> For resources located inside private virtual networks that can't allow direct inbound communication with the availability test agents in public Azure, the only option is to [create and host your own custom availability tests](./app/availavailability-azure-functions.md).
59+
> For resources located inside private virtual networks that can't allow direct inbound communication with the availability test agents in public Azure, the only option is to [create and host your own custom availability tests](app/availability-azure-functions.md#review-trackavailability-test-results).
6060
6161
### Service tag
6262

@@ -217,22 +217,22 @@ Managing changes to source IP addresses can be time consuming. Using *service ta
217217
1. Add the resource group name, and then enter **Instance details** information.
218218
1. Select **Review + Create**, and then select **Create**.
219219

220-
:::image type="content" source="../alerts/media/action-groups/action-group-create-security-group.png" alt-text="Screenshot that shows how to create a network security group."border="true":::
220+
:::image type="content" source="alerts/media/action-groups/action-group-create-security-group.png" alt-text="Screenshot that shows how to create a network security group."border="true":::
221221

222222
1. Go to **Resource Group**, and then select the network security group you created:
223223

224224
1. Select **Inbound security rules**.
225225
1. Select **Add**.
226226

227-
:::image type="content" source="../alerts/media/action-groups/action-group-add-service-tag.png" alt-text="Screenshot that shows how to add inbound security rules." border="true":::
227+
:::image type="content" source="alerts/media/action-groups/action-group-add-service-tag.png" alt-text="Screenshot that shows how to add inbound security rules." border="true":::
228228

229229
1. A new window opens in the right pane:
230230

231231
1. Under **Source**, enter **Service Tag**.
232232
1. Under **Source service tag**, enter **ActionGroup**.
233233
1. Select **Add**.
234234

235-
:::image type="content" source="../alerts/media/action-groups/action-group-service-tag.png" alt-text="Screenshot that shows how to add a service tag." border="true":::
235+
:::image type="content" source="alerts/media/action-groups/action-group-service-tag.png" alt-text="Screenshot that shows how to add a service tag." border="true":::
236236

237237
## Profiler
238238

0 commit comments

Comments
 (0)