Skip to content

Commit fa18443

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into liveResizeGA
2 parents b72024c + 6adaa42 commit fa18443

File tree

110 files changed

+678
-501
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

110 files changed

+678
-501
lines changed

articles/active-directory/governance/entitlement-management-access-package-auto-assignment-policy.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ During this preview, you can have at most one automatic assignment policy in an
2828

2929
This article describes how to create an access package automatic assignment policy for an existing access package.
3030

31+
## Before you begin
32+
33+
You'll need to have attributes populated on the users who will be in scope for being assigned access. The attributes you can use in the rules criteria of an access package assignment policy are those attributes listed in [supported properties](../enterprise-users/groups-dynamic-membership.md#supported-properties), along with [extension attributes and custom extension properties](../enterprise-users/groups-dynamic-membership.md#extension-properties-and-custom-extension-properties). These attributes can be brought into Azure AD from [Graph](/graph/api/resources/user?view=graph-rest-beta), an HR system such as [SuccessFactors](../app-provisioning/sap-successfactors-integration-reference.md), [Azure AD Connect cloud sync](../cloud-sync/how-to-attribute-mapping.md) or [Azure AD Connect sync](../hybrid/how-to-connect-sync-feature-directory-extensions.md).
34+
3135
## Create an automatic assignment policy (Preview)
3236

3337
To create a policy for an access package, you need to start from the access package's policy tab. Follow these steps to create a new policy for an access package.
@@ -45,7 +49,7 @@ To create a policy for an access package, you need to start from the access pack
4549
1. Provide a dynamic membership rule, using the [membership rule builder](../enterprise-users/groups-dynamic-membership.md) or by clicking **Edit** on the rule syntax text box.
4650

4751
> [!NOTE]
48-
> The rule builder might not be able to display some rules constructed in the text box. For more information, see [rule builder in the Azure portal](/enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
52+
> The rule builder might not be able to display some rules constructed in the text box, and validating a rule currently requires the you to be in the Global administrator role. For more information, see [rule builder in the Azure portal](/enterprise-users/groups-create-rule.md#rule-builder-in-the-azure-portal).
4953
5054
![Screenshot of an access package automatic assignment policy rule configuration.](./media/entitlement-management-access-package-auto-assignment-policy/auto-assignment-rule-configuration.png)
5155

articles/active-directory/privileged-identity-management/groups-role-settings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ Follow these steps to open the settings for an Azure privileged access group rol
2929
1. Open **Azure AD Privileged Identity Management**.
3030

3131
1. Select **Privileged access (Preview)**.
32+
>[!NOTE]
33+
> Approver doesn't have to be member of the group, owner of the group or have Azure AD role assigned.
3234
3335
1. Select the group that you want to manage.
3436

articles/active-directory/privileged-identity-management/pim-resource-roles-configure-role-settings.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,8 @@ Follow these steps to open the settings for an Azure resource role.
3030
1. Open **Azure AD Privileged Identity Management**.
3131

3232
1. Select **Azure resources**.
33+
>[!NOTE]
34+
> Approver doesn't have to have any Azure or Azure AD role assigned.
3335
3436
1. Select the resource you want to manage, such as a subscription or management group.
3537

articles/advisor/advisor-performance-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Azure Premium Storage delivers high-performance, low-latency disk support for vi
4848

4949
## Remove data skew on your Azure Synapse Analytics tables to increase query performance
5050

51-
Data skew can cause unnecessary data movement or resource bottlenecks when you run your workload. Advisor detects distribution data skew of greater than 15%. It recommends that you redistribute your data and revisit your table distribution key selections. To learn more about identifying and removing skew, see [troubleshooting skew](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-tables-distribute.md#how-to-tell-if-your-distribution-column-is-a-good-choice).
51+
Data skew can cause unnecessary data movement or resource bottlenecks when you run your workload. Advisor detects distribution data skew of greater than 15%. It recommends that you redistribute your data and revisit your table distribution key selections. To learn more about identifying and removing skew, see [troubleshooting skew](../synapse-analytics/sql-data-warehouse/sql-data-warehouse-tables-distribute.md#how-to-tell-if-your-distribution-is-a-good-choice).
5252

5353
## Create or update outdated table statistics in your Azure Synapse Analytics tables to increase query performance
5454

@@ -186,7 +186,7 @@ Learn more about [Azure Communication Services](../communication-services/overvi
186186

187187
1. Sign in to the [Azure portal](https://portal.azure.com), and then open [Advisor](https://aka.ms/azureadvisordashboard).
188188

189-
2. On the Advisor dashboard, select the **Performance** tab.
189+
2. On the Advisor dashboard, select the **Performance** tab.
190190

191191
## Next steps
192192

articles/api-management/api-management-transformation-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,7 +262,7 @@ or
262262
```
263263

264264
> [!NOTE]
265-
> Backend entities can be managed via [Azure portal](how-to-configure-service-fabric-backend.md), management [API](/rest/api/apimanagement), and [PowerShell](https://www.powershellgallery.com/packages?q=apimanagement).
265+
> Backend entities can be managed via [Azure portal](how-to-configure-service-fabric-backend.md), management [API](/rest/api/apimanagement), and [PowerShell](https://www.powershellgallery.com/packages?q=apimanagement). Currently, if you define a base `set-backend-service` policy using the `backend-id` attribute and inherit the base policy using `<base />` within the scope, then it can be only overridden with a policy using the `backend-id` attribute, not the `base-url` attribute.
266266
267267
### Example
268268

@@ -844,4 +844,4 @@ OriginalUrl.
844844

845845
- **Policy scopes:** all scopes
846846

847-
[!INCLUDE [api-management-policy-ref-next-steps](../../includes/api-management-policy-ref-next-steps.md)]
847+
[!INCLUDE [api-management-policy-ref-next-steps](../../includes/api-management-policy-ref-next-steps.md)]

articles/app-service/networking/private-endpoint.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Connect privately to a Web App using Azure Private Endpoint
44
author: ericgre
55
ms.assetid: 2dceac28-1ba6-4904-a15d-9e91d5ee162c
66
ms.topic: article
7-
ms.date: 03/04/2022
7+
ms.date: 08/23/2022
88
ms.author: ericg
99
ms.service: app-service
1010
ms.workload: web
@@ -49,7 +49,6 @@ From a security perspective:
4949
- By default, when you enable Private Endpoints to your Web App, you disable all public access.
5050
- You can enable multiple Private Endpoints in others VNets and Subnets, including VNets in other regions.
5151
- The IP address of the Private Endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint.
52-
- The NIC of the Private Endpoint can't have an NSG associated.
5352
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint: see [Disable network policies for private endpoints][disablesecuritype]. As a result, you can't filter by any NSG the access to your Private Endpoint.
5453
- By default, when you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App isn't evaluated.
5554
- You can eliminate the data exfiltration risk from the VNet by removing all NSG rules where destination is tag Internet or Azure services. When you deploy a Private Endpoint for a Web App, you can only reach this specific Web App through the Private Endpoint. If you have another Web App, you must deploy another dedicated Private Endpoint for this other Web App.

articles/app-service/quickstart-python.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'Quickstart: Deploy a Python (Django or Flask) web app to Azure'
33
description: Get started with Azure App Service by deploying your first Python app to Azure App Service.
44
ms.topic: quickstart
5-
ms.date: 03/22/2022
5+
ms.date: 08/23/2022
66
author: mijacobs
77
ms.author: mijacobs
88
ms.devlang: python
@@ -17,6 +17,8 @@ To complete this quickstart, you need:
1717
1. An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?ref=microsoft.com&utm_source=microsoft.com&utm_medium=docs&utm_campaign=visualstudio).
1818
1. <a href="https://www.python.org/downloads/" target="_blank">Python 3.9 or higher</a> installed locally.
1919

20+
>**Note**: This article contains current instructions on deploying a Python web app using Azure App Service. Python on Windows is no longer supported.
21+
2022
## 1 - Sample application
2123

2224
This quickstart can be completed using either Flask or Django. A sample application in each framework is provided to help you follow along with this quickstart. Download or clone the sample application to your local workstation.

articles/azure-functions/functions-how-to-github-actions.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.date: 10/07/2020
66
ms.custom: "devx-track-csharp, devx-track-python, github-actions-azure"
77
---
88

9-
# Continuous delivery by using GitHub Action
9+
# Continuous delivery by using GitHub Actions
1010

1111
Use [GitHub Actions](https://github.com/features/actions) to define a workflow to automatically build and deploy code to your function app in Azure Functions.
1212

@@ -210,7 +210,7 @@ jobs:
210210
build-and-deploy:
211211
runs-on: ubuntu-latest
212212
steps:
213-
- name: 'Checkout GitHub Action'
213+
- name: 'Checkout GitHub action'
214214
uses: actions/checkout@v2
215215
216216
- name: Setup DotNet ${{ env.DOTNET_VERSION }} Environment
@@ -224,7 +224,7 @@ jobs:
224224
pushd './${{ env.AZURE_FUNCTIONAPP_PACKAGE_PATH }}'
225225
dotnet build --configuration Release --output ./output
226226
popd
227-
- name: 'Run Azure Functions Action'
227+
- name: 'Run Azure Functions action'
228228
uses: Azure/functions-action@v1
229229
with:
230230
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}
@@ -248,7 +248,7 @@ jobs:
248248
build-and-deploy:
249249
runs-on: windows-latest
250250
steps:
251-
- name: 'Checkout GitHub Action'
251+
- name: 'Checkout GitHub action'
252252
uses: actions/checkout@v2
253253
254254
- name: Setup DotNet ${{ env.DOTNET_VERSION }} Environment
@@ -262,7 +262,7 @@ jobs:
262262
pushd './${{ env.AZURE_FUNCTIONAPP_PACKAGE_PATH }}'
263263
dotnet build --configuration Release --output ./output
264264
popd
265-
- name: 'Run Azure Functions Action'
265+
- name: 'Run Azure Functions action'
266266
uses: Azure/functions-action@v1
267267
with:
268268
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}
@@ -290,7 +290,7 @@ jobs:
290290
build-and-deploy:
291291
runs-on: ubuntu-latest
292292
steps:
293-
- name: 'Checkout GitHub Action'
293+
- name: 'Checkout GitHub action'
294294
uses: actions/checkout@v2
295295
296296
- name: Setup Java Sdk ${{ env.JAVA_VERSION }}
@@ -305,7 +305,7 @@ jobs:
305305
mvn clean package
306306
mvn azure-functions:package
307307
popd
308-
- name: 'Run Azure Functions Action'
308+
- name: 'Run Azure Functions action'
309309
uses: Azure/functions-action@v1
310310
with:
311311
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}
@@ -331,7 +331,7 @@ jobs:
331331
build-and-deploy:
332332
runs-on: windows-latest
333333
steps:
334-
- name: 'Checkout GitHub Action'
334+
- name: 'Checkout GitHub action'
335335
uses: actions/checkout@v2
336336
337337
- name: Setup Java Sdk ${{ env.JAVA_VERSION }}
@@ -346,7 +346,7 @@ jobs:
346346
mvn clean package
347347
mvn azure-functions:package
348348
popd
349-
- name: 'Run Azure Functions Action'
349+
- name: 'Run Azure Functions action'
350350
uses: Azure/functions-action@v1
351351
with:
352352
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}
@@ -373,7 +373,7 @@ jobs:
373373
build-and-deploy:
374374
runs-on: ubuntu-latest
375375
steps:
376-
- name: 'Checkout GitHub Action'
376+
- name: 'Checkout GitHub action'
377377
uses: actions/checkout@v2
378378
379379
- name: Setup Node ${{ env.NODE_VERSION }} Environment
@@ -389,7 +389,7 @@ jobs:
389389
npm run build --if-present
390390
npm run test --if-present
391391
popd
392-
- name: 'Run Azure Functions Action'
392+
- name: 'Run Azure Functions action'
393393
uses: Azure/functions-action@v1
394394
with:
395395
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}
@@ -414,7 +414,7 @@ jobs:
414414
build-and-deploy:
415415
runs-on: windows-latest
416416
steps:
417-
- name: 'Checkout GitHub Action'
417+
- name: 'Checkout GitHub action'
418418
uses: actions/checkout@v2
419419
420420
- name: Setup Node ${{ env.NODE_VERSION }} Environment
@@ -430,7 +430,7 @@ jobs:
430430
npm run build --if-present
431431
npm run test --if-present
432432
popd
433-
- name: 'Run Azure Functions Action'
433+
- name: 'Run Azure Functions action'
434434
uses: Azure/functions-action@v1
435435
with:
436436
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}
@@ -457,7 +457,7 @@ jobs:
457457
build-and-deploy:
458458
runs-on: ubuntu-latest
459459
steps:
460-
- name: 'Checkout GitHub Action'
460+
- name: 'Checkout GitHub action'
461461
uses: actions/checkout@v2
462462
463463
- name: Setup Python ${{ env.PYTHON_VERSION }} Environment
@@ -472,7 +472,7 @@ jobs:
472472
python -m pip install --upgrade pip
473473
pip install -r requirements.txt --target=".python_packages/lib/site-packages"
474474
popd
475-
- name: 'Run Azure Functions Action'
475+
- name: 'Run Azure Functions action'
476476
uses: Azure/functions-action@v1
477477
with:
478478
app-name: ${{ env.AZURE_FUNCTIONAPP_NAME }}

articles/azure-monitor/agents/agents-overview.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -201,9 +201,10 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
201201
| | Event Hub | | | X |
202202
| **Services and features supported** | | | | |
203203
| | Microsoft Sentinel | X ([View scope](#supported-services-and-features)) | X | |
204-
| | VM Insights | | X (Public preview) | |
205-
| | Azure Automation | | X | |
206-
| | Microsoft Defender for Cloud | | X | |
204+
| | VM Insights | X (Public preview) | X | |
205+
| | Microsoft Defender for Cloud | X (Public preview) | X | |
206+
| | Update Management | X (Public preview, independent of monitoring agents) | X | |
207+
| | Change Tracking | | X | |
207208

208209
### Linux agents
209210

@@ -223,11 +224,11 @@ The tables below provide a comparison of Azure Monitor Agent with the legacy the
223224
| | Azure Storage | | | X | |
224225
| | Event Hub | | | X | |
225226
| **Services and features supported** | | | | | |
226-
| | Microsoft Sentinel | X ([View scope](#supported-services-and-features)) | X | | |
227-
| | VM Insights | X (Public preview) | X | | |
228-
| | Container Insights | X (Public preview) | X | | |
229-
| | Azure Automation | | X | | |
230-
| | Microsoft Defender for Cloud | | X | | |
227+
| | Microsoft Sentinel | X ([View scope](#supported-services-and-features)) | X | |
228+
| | VM Insights | X (Public preview) | X | |
229+
| | Microsoft Defender for Cloud | X (Public preview) | X | |
230+
| | Update Management | X (Public preview, independent of monitoring agents) | X | |
231+
| | Change Tracking | | X | |
231232

232233
<sup>1</sup> To review other limitations of using Azure Monitor Metrics, see [quotas and limits](../essentials/metrics-custom-overview.md#quotas-and-limits). On Linux, using Azure Monitor Metrics as the only destination is supported in v.1.10.9.0 or higher.
233234

articles/azure-monitor/app/export-telemetry.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,9 @@ To migrate to diagnostic settings export:
271271
> [!CAUTION]
272272
> If you want to store diagnostic logs in a Log Analytics workspace, there are two things to consider to avoid seeing duplicate data in Application Insights:
273273
> * The destination can't be the same Log Analytics workspace that your Application Insights resource is based on.
274-
> * The Application Insights user can't have access to both the Application Insights resource and the workspace created for diagnostic logs. This can be done with [Azure role-based access control (Azure RBAC)](./resources-roles-access-control.md).
274+
> * The Application Insights user can't have access to both workspaces. This can be done by setting the Log Analytics [Access control mode](/azure/azure-monitor/logs/log-analytics-workspace-overview#permissions) to **Requires workspace permissions** and ensuring through [Azure role-based access control (Azure RBAC)](./resources-roles-access-control.md) that the user only has access to the Log Analytics workspace the Application Insights resource is based on.
275+
>
276+
> These steps are necessary because Application Insights accesses telemetry across Application Insight resources (including Log Analytics workspaces) to provide complete end-to-end transaction operations and accurate application maps. Because diagnostic logs use the same table names, duplicate telemetry can be displayed if the user has access to multiple resources containing the same data.
275277
276278
<!--Link references-->
277279

0 commit comments

Comments
 (0)