Skip to content

Commit 1fafecc

Browse files
authored
Merge pull request #51263 from KevSch/kevin-retire-1
Retire Introduction to Azure Monitor module
2 parents 0f56d61 + c61c7c7 commit 1fafecc

30 files changed

+123
-651
lines changed

.openpublishing.redirection.json

Lines changed: 118 additions & 83 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,41 @@
3939
"source_path_from_root": "/learn-pr/azure/deploy-java-spring-boot-app-service-mysql/7-summary.yml",
4040
"redirect_url": "https://learn.microsoft.com/azure/app-service/tutorial-java-spring-cosmosdb",
4141
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/1-introduction.yml",
45+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/2-what-is-azure-monitor.yml",
50+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/3-how-azure-monitor-works.yml",
55+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/4-when-to-use-azure-monitor.yml",
60+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/5-knowledge-check.yml",
65+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/6-summary.yml",
70+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path_from_root": "/learn-pr/azure/intro-to-azure-monitor/index.yml",
75+
"redirect_url": "https://learn.microsoft.com/training/modules/monitor-azure-vm-using-diagnostic-data",
76+
"redirect_document_id": false
4277
},
4378
{
4479
"source_path_from_root": "/learn-pr/achievements/learn.azure.deploy-java-spring-boot-app-service-mysql.badge.yml",
@@ -51365,87 +51400,87 @@
5136551400
{
5136651401
"source_path": "learn-pr/paths/introduction-ai-for-business-users/index.md",
5136751402
"redirect_url": "/training/paths/transform-your-business-with-microsoft-ai/",
51368-
"redirect_document_id": false
51369-
},
51370-
{
51371-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/index.md",
51372-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51373-
"redirect_document_id": false
51374-
},
51375-
{
51376-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/6-configure-search-permissions-filters.md",
51377-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51378-
"redirect_document_id": false
51379-
},
51380-
{
51381-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/3-create-content-search.md",
51382-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51383-
"redirect_document_id": false
51384-
},
51385-
{
51386-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/2-explore-ediscovery-solutions.md",
51387-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51388-
"redirect_document_id": false
51389-
},
51390-
{
51391-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/5-export-search-results.md",
51392-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51393-
"redirect_document_id": false
51394-
},
51395-
{
51396-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/1-introduction.md",
51397-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51398-
"redirect_document_id": false
51399-
},
51400-
{
51401-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/8-knowledge-check.md",
51402-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51403-
"redirect_document_id": false
51404-
},
51405-
{
51406-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/7-search-delete-email-messages.md",
51407-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51408-
"redirect_document_id": false
51409-
},
51410-
{
51411-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/9-summary.md",
51412-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51413-
"redirect_document_id": false
51414-
},
51415-
{
51416-
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/4-view-search-results.md",
51417-
"redirect_url": "/training/modules/purview-ediscovery-search/",
51418-
"redirect_document_id": false
51419-
},
51420-
{
51421-
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/index.md",
51422-
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51423-
"redirect_document_id": false
51424-
},
51425-
{
51426-
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/2-describe-controls.md",
51427-
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51428-
"redirect_document_id": false
51429-
},
51430-
{
51431-
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/3-implement-policy.md",
51432-
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51433-
"redirect_document_id": false
51434-
},
51435-
{
51436-
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/1-introduction.md",
51437-
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51438-
"redirect_document_id": false
51439-
},
51440-
{
51441-
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/4-knowledge-check.md",
51442-
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51443-
"redirect_document_id": false
51444-
},
51445-
{
51446-
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/5-summary.md",
51447-
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51448-
"redirect_document_id": false
51449-
}
51450-
]
51403+
"redirect_document_id": false
51404+
},
51405+
{
51406+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/index.md",
51407+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51408+
"redirect_document_id": false
51409+
},
51410+
{
51411+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/6-configure-search-permissions-filters.md",
51412+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51413+
"redirect_document_id": false
51414+
},
51415+
{
51416+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/3-create-content-search.md",
51417+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51418+
"redirect_document_id": false
51419+
},
51420+
{
51421+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/2-explore-ediscovery-solutions.md",
51422+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51423+
"redirect_document_id": false
51424+
},
51425+
{
51426+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/5-export-search-results.md",
51427+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51428+
"redirect_document_id": false
51429+
},
51430+
{
51431+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/1-introduction.md",
51432+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51433+
"redirect_document_id": false
51434+
},
51435+
{
51436+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/8-knowledge-check.md",
51437+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51438+
"redirect_document_id": false
51439+
},
51440+
{
51441+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/7-search-delete-email-messages.md",
51442+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51443+
"redirect_document_id": false
51444+
},
51445+
{
51446+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/9-summary.md",
51447+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51448+
"redirect_document_id": false
51449+
},
51450+
{
51451+
"source_path": "learn-pr/wwl-sci/investigate-threats-with-content-search-in-microsoft-purview/4-view-search-results.md",
51452+
"redirect_url": "/training/modules/purview-ediscovery-search/",
51453+
"redirect_document_id": false
51454+
},
51455+
{
51456+
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/index.md",
51457+
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51458+
"redirect_document_id": false
51459+
},
51460+
{
51461+
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/2-describe-controls.md",
51462+
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51463+
"redirect_document_id": false
51464+
},
51465+
{
51466+
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/3-implement-policy.md",
51467+
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51468+
"redirect_document_id": false
51469+
},
51470+
{
51471+
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/1-introduction.md",
51472+
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51473+
"redirect_document_id": false
51474+
},
51475+
{
51476+
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/4-knowledge-check.md",
51477+
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51478+
"redirect_document_id": false
51479+
},
51480+
{
51481+
"source_path": "learn-pr/wwl-azure/create-implement-application-allowlists-adaptive-application-control/5-summary.md",
51482+
"redirect_url": "/training/paths/implement-windows-server-iaas-virtual-machine-security/",
51483+
"redirect_document_id": false
51484+
}
51485+
]
5145151486
}

learn-pr/achievements.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,11 @@ achievements:
1515
title: Characterize an unfamiliar dataset with Azure Data Explorer
1616
summary: Learn how to characterize an unfamiliar dataset using Azure Data Explorer.
1717
iconUrl: /training/achievements/azure-data-explore-web.svg
18+
- uid: learn.azure.intro-to-azure-monitor.badge
19+
type: badge
20+
title: Introduction to Azure Monitor
21+
summary: Learn how to use Azure Monitor to provide insights into your Azure resource performance and operations.
22+
iconUrl: /training/achievements/intro-to-azure-monitor.svg
1823
- uid: learn.visualize-data-workbooks.badge
1924
type: badge
2025
title: Visualize data combined from multiple data sources by using Azure Monitor Workbooks

learn-pr/azure/intro-to-azure-monitor/1-introduction.yml

Lines changed: 0 additions & 15 deletions
This file was deleted.

learn-pr/azure/intro-to-azure-monitor/2-what-is-azure-monitor.yml

Lines changed: 0 additions & 15 deletions
This file was deleted.

learn-pr/azure/intro-to-azure-monitor/3-how-azure-monitor-works.yml

Lines changed: 0 additions & 15 deletions
This file was deleted.

learn-pr/azure/intro-to-azure-monitor/4-when-to-use-azure-monitor.yml

Lines changed: 0 additions & 15 deletions
This file was deleted.

learn-pr/azure/intro-to-azure-monitor/5-knowledge-check.yml

Lines changed: 0 additions & 74 deletions
This file was deleted.

learn-pr/azure/intro-to-azure-monitor/6-summary.yml

Lines changed: 0 additions & 15 deletions
This file was deleted.

0 commit comments

Comments
 (0)