You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article provides a reference for required and optional settings that are used to configure the API Management [self-hosted gateway container](self-hosted-gateway-overview.md).
15
+
This article provides a reference for required and optional settings that are used to configure the API Management [self-hosted gateway container](self-hosted-gateway-overview.md).
16
+
17
+
To learn more about our (Kubernetes) production guidance, we recommend reading [this article](how-to-self-hosted-gateway-on-kubernetes-in-production.md).
16
18
17
19
> [!IMPORTANT]
18
20
> This reference applies only to the self-hosted gateway v2. Minimum versions for availability of settings are provided.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/log-analytics-workspace-insights-overview.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,6 +14,12 @@ ms.date: 06/27/2022
14
14
15
15
Log Analytics Workspace Insights provides comprehensive monitoring of your workspaces through a unified view of your workspace usage, performance, health, agent, queries, and change log. This article helps you understand how to onboard and use Log Analytics Workspace Insights.
16
16
17
+
## Permissions required
18
+
19
+
- You need `Microsoft.OperationalInsights/workspaces/read` permissions to the Log Analytics workspace whose insights you want to see, as provided by the [Log Analytics Reader built-in role](./manage-access.md#log-analytics-reader), for example..
20
+
- To run the additional usage queries, you need `*/read` permissions, as provided by the [Log Analytics Reader built-in role](./manage-access.md#log-analytics-reader), for example.
21
+
22
+
17
23
## Overview of your Log Analytics workspaces
18
24
19
25
When you access Log Analytics Workspace Insights through Azure Monitor Insights, the **At scale** perspective is shown. Here you can:
Copy file name to clipboardExpand all lines: articles/cost-management-billing/understand/analyze-unexpected-charges.md
+34-8Lines changed: 34 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.reviewer: micflan
7
7
ms.service: cost-management-billing
8
8
ms.subservice: cost-management
9
9
ms.topic: conceptual
10
-
ms.date: 11/14/2023
10
+
ms.date: 12/08/2023
11
11
ms.author: banders
12
12
---
13
13
@@ -25,7 +25,7 @@ In general, there are three types of changes that you might want to investigate:
25
25
26
26
## Identify cost anomalies
27
27
28
-
The cloud comes with the promise of significant cost savings compared to on-premises costs. However, savings require diligence to proactively plan, govern, and monitor your cloud solutions. Even with proactive processes, cost surprises can still happen. For example, you might notice that something has changed, but you're not sure what. Using Cost Management anomaly detection for your subscriptions can help minimize surprises.
28
+
The cloud comes with the promise of significant cost savings compared to on-premises costs. However, savings require diligence to proactively plan, govern, and monitor your cloud solutions. Even with proactive processes, cost surprises can still happen. For example, you might notice that something changed, but you're not sure what. Using Cost Management anomaly detection for your subscriptions can help minimize surprises.
29
29
30
30
Whether you know if you have any existing cost anomalies or not, Cost analysis informs you if it finds anything unusual as part of Insights. If not, Cost analysis shows **No anomalies detected**.
31
31
@@ -43,7 +43,7 @@ If you don't have any anomalies, you see a **No anomalies detected** insight, co
43
43
44
44
### Drill into anomaly details
45
45
46
-
To drill into the underlying data for something that has changed, select the insight link. It opens a view in classic cost analysis where you can review your daily usage by resource group for the time range that was evaluated.
46
+
To drill into the underlying data for something that changed, select the insight link. It opens a view in classic cost analysis where you can review your daily usage by resource group for the time range that was evaluated.
47
47
48
48
Continuing from the previous example of the anomaly labeled **Daily run rate down 748% on Sep 28**, let's examine its details after the link is selected. The following example image shows details about the anomaly. Notice the large increase in costs, a cost spike, and eventual drop in from a temporary, short-lived resource.
49
49
@@ -64,10 +64,10 @@ You can create an alert to automatically get notified when an anomaly is detecte
64
64
65
65
An anomaly alert email includes a summary of changes in resource group count and cost. It also includes the top resource group changes for the day compared to the previous 60 days. And, it has a direct link to the Azure portal so that you can review the cost and investigate further.
66
66
67
-
An anomaly alert email is sent only one time when it's detected.
67
+
An anomaly alert email is sent only once - at the time of detection.
68
68
69
69
1. From Azure Home, select **Cost Management** under **Tools**.
70
-
1. Verify you've selected the correct subscription in the scope at the top of the page.
70
+
1. Verify the correct subscription is selected in the scope at the top of the page.
71
71
1. In the left menu, select **Cost alerts**.
72
72
1. On the toolbar, select **+ Add**.
73
73
1. On the Create alert rule page, select **Anomaly** as the **Alert type**.
@@ -95,7 +95,7 @@ Let's examine the increase in cost for the resource group more fully. To drill i
95
95
96
96
:::image type="content" source="./media/analyze-unexpected-charges/drill-in-articmustang-daily-cost.png" alt-text="Example screenshot showing an increase in daily costs." lightbox="./media/analyze-unexpected-charges/drill-in-articmustang-daily-cost.png" :::
97
97
98
-
So far, we've found an increase in cost for the `articmustang` resource group at the end of June and the beginning of July. You might notice that the cost increase spanned over two days. The change took two days because a change in the middle of a day doesn't show the full effect of that change until the following full day.
98
+
So far, we found an increase in cost for the `articmustang` resource group at the end of June and the beginning of July. You might notice that the cost increase spanned over two days. The change took two days because a change in the middle of a day doesn't show the full effect of that change until the following full day.
99
99
100
100
Let's continue drilling into the data to find out more about the cost increase. Select the item that increased in cost (`articmustang`) to automatically set a filter for the resource group name. Then, change the **Group by** list to **Resource**. Then set the date range to a smaller period. For example, June 28 to July 4. In the following example image, the increase in cost is clearly shown. The type of resource is shown as _microsoft.network/virtualnetworkgateways_.
101
101
@@ -111,7 +111,7 @@ At this point, you know what changed and the value that costs changed. However,
111
111
112
112
## Find people responsible for changed resource use
113
113
114
-
Using Cost analysis, you might have found resources that had sudden changes in usage. However, it might not be obvious who is responsible for the resource or why the change was made. Often, the team responsible for a given resource knows about changes that were made to a resource. Engaging them is useful as you identify why charges might appear. For example, the owning team may have recently created the resource, updated its SKU (thereby changing the resource rate), or increased the load on the resource due to code changes.
114
+
Using Cost analysis, you might find resources that had sudden changes in usage. However, it might not be obvious who is responsible for the resource or why the change was made. Often, the team responsible for a given resource knows about changes that were made to a resource. Engaging them is useful as you identify why charges might appear. For example, the owning team created the resource, updated its SKU (thereby changing the resource rate), or increased the load on the resource due to code changes.
115
115
116
116
The [Get resource changes](../../governance/resource-graph/how-to/get-resource-changes.md) article for Azure Resource Graph might help you to find additional information about configuration changes to resources.
117
117
@@ -129,9 +129,35 @@ People that have write access to a subscription or resource group typically have
129
129
130
130
If you have an existing policy of [tagging resources](../costs/cost-mgt-best-practices.md#tag-shared-resources), the resource might be tagged with identifying information. For example, resources might be tagged with owner, cost center, or development environment information. If you don't already have a resource tagging policy in place, consider adopting one to help identify resources in the future.
131
131
132
+
## Other strategies to identify unexpected charges
133
+
134
+
If you used the preceding strategies and you still don't understand why you received a charge or if you need other help with billing issues, review the following sections.
135
+
136
+
### Why am I not receiving emails from anomaly alerts?
137
+
138
+
There are several reasons why you're not receiving alert emails. Try the following actions:
139
+
140
+
- Confirm that the creator of the schedule continues to have Reader role assigned or `Microsoft.CostManagement/scheduledActions/read` permission, if it's a custom role.
141
+
- Confirm that your email address is shown as a recipient and that it's correct.
142
+
- Make sure that there are no email rules that block `[email protected]`.
143
+
- Check your spam or junk mail folder for emails from `[email protected]`.
144
+
- Check to see if the alert is expired or deleted. You can extend or create a new anomaly alert rule to fix the problem.
145
+
- Work with your admin to reenable the [view charges policy](../costs/assign-access-acm-data.md#enable-access-to-costs-in-the-azure-portal) in the Azure portal. The policy applies to indirect Enterprise Agreements and to Microsoft Customer Agreements with a Microsoft partner.
146
+
147
+
>[!NOTE]
148
+
> Azure checks the permissions of the alert rule creator before sending the alert email. If your organization has a policy that prohibits permanently assigning higher privileges to users, you can use a service principal and create the alert directly using the [Scheduled Actions API](/rest/api/cost-management/scheduled-actions/create-or-update-by-scope#createorupdateinsightalertscheduledactionbyscope).
149
+
150
+
### Why am I not able to create an anomaly alert rule?
151
+
152
+
Try the following steps:
153
+
154
+
- Anomaly alert rules can only be created at the subscription scope. Ensure that the correct scope is selected.
155
+
- Verify that you have the Owner, Contributor, or Cost Management Contributor role on the subscription.
156
+
- If you got an error message indicating that you reached the limit of five alerts per subscription, consider editing an existing anomaly alert rule. Add yourself as a recipient instead of creating a new rule in case you exhausted the limit.
157
+
132
158
## Get help to identify charges
133
159
134
-
If you've used the preceding strategies and you still don't understand why you received a charge or if you need other help with billing issues, [create a support request](https://go.microsoft.com/fwlink/?linkid=2083458).
160
+
If used the preceding strategies and you still don't understand why you received a charge or if you need other help with billing issues, [create a support request](https://go.microsoft.com/fwlink/?linkid=2083458).
title: Defender for APIs reaches GA | Defender for Cloud in the Field
3
+
description: Learn about what's new in Defender for APIs GA.
4
+
ms.topic: reference
5
+
ms.date: 12/10/2023
6
+
---
7
+
8
+
# Defender for APIs reaches GA
9
+
10
+
**Episode description**: In this episode of Defender for Cloud in the Field, Haris Sohail joins Yuri Diogenes to talk about what's news in Defender for APIs GA. Haris gives a quick recap about API security, explains the value proposition of Defender APIs, and covers all the Ignite announcements related to Defender for APIs. Haris also demonstrates some features, such as the integration with Purview, Defender CSPM, and the new partnership with 42Crunch.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/subassessment-rest-api.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,9 +15,7 @@ ms.topic: how-to
15
15
Azure Resource Graph (ARG) provides a REST API that can be used to pragmatically access vulnerability assessment results for both Azure registry and runtime vulnerabilities recommendations.
16
16
Learn more about [ARG references and query examples](/azure/governance/resource-graph/overview).
17
17
18
-
Azure container registry vulnerabilities sub assessments are published to ARG as part of the security resources. For more information, see:
-[Generic Security Sub Assessment Query](/azure/governance/resource-graph/samples/samples-by-category?tabs=azure-cli#list-container-registry-vulnerability-assessment-results)
18
+
Azure container registry vulnerabilities sub-assessments are published to ARG as part of the security resources. Learn more about [security sub-assessments](/azure/governance/resource-graph/samples/samples-by-category?tabs=azure-cli#list-container-registry-vulnerability-assessment-results).
0 commit comments