Skip to content

Commit 0d300a6

Browse files
author
ecfan
committed
Update dates and metadata
1 parent 781d161 commit 0d300a6

6 files changed

Lines changed: 82 additions & 62 deletions

articles/logic-apps/connectors/sap-create-example-scenario-workflows.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,23 @@
11
---
2-
title: Create common SAP workflows
3-
description: Build workflows for common SAP scenarios in Azure Logic Apps.
4-
services: logic-apps
2+
title: Create Common SAP Integration Workflows
3+
description: Build integration workflows for common SAP integration scenarios by using workflows in Azure Logic Apps.
4+
services: azure-logic-apps
55
ms.suite: integration
66
author: daviburg
77
ms.author: daviburg
8-
ms.reviewer: estfan, azla
8+
ms.reviewers: estfan, azla
99
ms.topic: how-to
10-
ms.date: 02/12/2025
10+
ms.update-cycle: 1095-days
11+
ms.date: 03/13/2026
1112
ms.custom: sfi-ropc-nochange
12-
#As an integration solution developer, I want to learn how I can build automated workflows that perform tasks with SAP resources.
13+
#Customer intent: As an SAP integration solution developer who works with Azure Logic Apps, I want to create automation and integration workflows that perform tasks with SAP resources.
1314
---
1415

1516
# Create workflows for common SAP integration scenarios in Azure Logic Apps
1617

17-
[!INCLUDE [logic-apps-sku-consumption-standard](../../../includes/logic-apps-sku-consumption-standard.md)]
18+
[!INCLUDE [logic-apps-sku-consumption-standard](../includes/logic-apps-sku-consumption-standard.md)]
1819

19-
This how-to guide shows how to create example logic app workflows for some common SAP integration scenarios using Azure Logic Apps and the SAP connector.
20+
This guide shows how to create example logic app workflows for some common SAP integration scenarios using Azure Logic Apps and the SAP connector.
2021

2122
Both Standard and Consumption logic app workflows offer the SAP *managed* connector that's hosted and run in multitenant Azure. Standard workflows also offer the SAP *built-in service provider* connector that's hosted and run in single-tenant Azure Logic Apps. For more information, see [Connector technical reference](sap.md#connector-technical-reference).
2223

articles/logic-apps/healthy-unhealthy-resource.md

Lines changed: 35 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,33 @@
11
---
2-
title: Set up logging to monitor logic apps in Azure Security Center
3-
description: Monitor health for Azure Logic Apps resources in Azure Security Center by setting up diagnostic logging.
4-
services: logic-apps
2+
title: Monitor Resource Health with Defender for Cloud
3+
description: Monitor resource health for Azure Logic Apps by setting up diagnostic logging with Microsoft Defender for Cloud in Azure Security Center.
4+
services: azure-logic-apps
55
ms.suite: integration
6-
ms.reviewer: estfan, azla
6+
ms.reviewers: estfan, azla
77
ms.topic: how-to
8-
ms.date: 02/20/2025
8+
ms.update-cycle: 1095-days
9+
ms.date: 03/13/2026
10+
# Customer intent: As an integration developer who works with Azure Logic Apps, I want to set up resource health monitoring and diagnostic logging with Microsoft Defender for Cloud in Azure Security Center.
911
---
1012

11-
# Set up logging to monitor logic apps in Microsoft Defender for Cloud
13+
# Monitor resource health for Azure Logic Apps by setting up logging in Azure Security Center
1214

13-
When you monitor your Azure Logic Apps resources in [Microsoft Azure Security Center](../security-center/security-center-introduction.md), you can [review whether your logic apps are following the default policies](#view-logic-apps-health-status). Azure shows the health status for an Azure Logic Apps resource after you enable logging and correctly set up the logs' destination. This article explains how to configure diagnostic logging and make sure that all your logic apps are healthy resources.
15+
When you monitor your Azure Logic Apps resources by using with Microsoft Defender for Cloud in Microsoft Azure Security Center, you can check whether your logic apps follow default policies. Azure shows the health status for a resource in Azure Logic Apps after you enable logging and correctly set up the logs' destination.
16+
17+
This guide shows how to configure diagnostic logging and make sure that all your logic apps are healthy resources.
18+
19+
For more information, see:
20+
21+
- [Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
22+
- [Microsoft Azure Security Center](../security-center/security-center-introduction.md)
1423

1524
> [!TIP]
16-
>
17-
> To find the current status for the Azure Logic Apps service, review the
18-
> [Azure status page](https://azure.status.microsoft/), which lists the status for different products and services in each available region.
25+
>
26+
> To find the current status for the Azure Logic Apps service, visit the [Azure status page](https://azure.status.microsoft/). This page lists the statuses for different products and services in each available region.
1927
2028
## Prerequisites
2129

22-
* An Azure subscription. If you don't have a subscription, [create a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
30+
* An Azure subscription. [Get a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
2331

2432
* Existing logic apps with [diagnostic logging enabled](#enable-diagnostic-logging).
2533

@@ -30,28 +38,31 @@ When you monitor your Azure Logic Apps resources in [Microsoft Azure Security Ce
3038
Before you can view the resource health status for your logic apps, you must first [set up diagnostic logging](monitor-workflows-collect-diagnostic-data.md). If you already have a Log Analytics workspace, you can enable logging either when you create your logic app or on existing logic apps.
3139

3240
> [!TIP]
41+
>
3342
> The default recommendation is to enable diagnostic logs for Azure Logic Apps. However, you control this setting for your logic apps. When you enable diagnostic logs for your logic apps, you can use the information to help analyze security incidents.
3443
3544
### Check diagnostic logging setting
3645

3746
If you're not sure whether your logic apps have diagnostic logging enabled, you can check in Defender for Cloud:
3847

39-
1. Sign in to the [Azure portal](https://portal.azure.com).
40-
1. In the search bar, enter and select **Defender for Cloud**.
48+
1. In the [Azure portal](https://portal.azure.com) search bar, enter and select **Defender for Cloud**.
4149
1. On the workload protection dashboard menu, under **General**, select **Recommendations**.
42-
1. In the table of security suggestions, find and select **Enable auditing and logging** > **Diagnostic logs in Logic Apps should be enabled** in the table of security controls.
43-
1. On the recommendation page, expand the **Remediation steps** section and review the options. You can enable Azure Logic Apps diagnostics by selecting the **Quick Fix!** button, or by following the manual remediation instructions.
50+
1. In the table of security suggestions, find the table of security controls.
51+
1. Find and select **Enable auditing and logging** > **Diagnostic logs in Logic Apps should be enabled**.
52+
1. On the recommendation page, expand the **Remediation steps** section and review the options.
53+
1. Enable Azure Logic Apps diagnostics by selecting the **Quick Fix!** button, or by following the manual remediation instructions.
4454

4555
## View logic apps' health status
4656

47-
After you've [enabled diagnostic logging](#enable-diagnostic-logging), you can see the health status of your logic apps in Defender for Cloud.
57+
After you [enable diagnostic logging](#enable-diagnostic-logging), you can see the health status of your logic apps in Defender for Cloud.
4858

49-
1. Sign in to the [Azure portal](https://portal.azure.com).
50-
1. In the search bar, enter and select **Defender for Cloud**.
59+
1. In the [Azure portal](https://portal.azure.com) search bar, enter and select **Defender for Cloud**.
5160
1. On the workload protection dashboard menu, under **General**, select **Inventory**.
52-
1. On the inventory page, filter your assets list to show only Azure Logic Apps resources. In the page menu, select **Resource types** > **logic apps**.
61+
1. On the inventory page, filter your assets list to show only Azure Logic Apps resources.
62+
1. From the page menu, select **Resource types** > **logic apps**.
5363

5464
The **Unhealthy Resources** counter shows the number of logic apps that Defender for Cloud considers unhealthy.
65+
5566
1. In the list of logic apps resources, review the **Recommendations** column. To review the health details for a specific logic app, select a resource name, or select the ellipses button (**...**) > **View resource**.
5667
1. To remediate any potential resource health issues, follow the steps listed for your logic apps.
5768

@@ -123,3 +134,8 @@ If you use a storage account as the destination for your Azure Logic Apps diagno
123134
}
124135
]
125136
```
137+
138+
# Related content
139+
140+
- [Monitor Standard workflow health with Health Check](monitor-health-standard-workflows.md)
141+
- [Monitor workflows in Azure Logic Apps](monitor-logic-apps-overview.md)

articles/logic-apps/logic-apps-batch-process-send-receive-messages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Now create one or more batch sender logic app workflows that send messages to th
133133

134134
* Make sure that you previously [created and deployed your batch receiver](#batch-receiver) so when you create your batch sender, you can select the existing batch receiver as the destination batch. While batch receivers don't need to know anything about batch senders, batch senders must know where to send messages.
135135

136-
* Make sure that your batch receiver and batch sender share the same Azure region *and* Azure subscription. If they don't, you can't select the batch receiver when you create the batch sender because they're not visible to each other.
136+
* Make sure that your batch receiver and batch sender both share the same Azure region *and* Azure subscription. If they don't, you can't select the batch receiver when you create the batch sender because they're not visible to each other.
137137

138138
1. Create another logic app resource and workflow named **BatchSender**.
139139

articles/logic-apps/logic-apps-enterprise-integration-agreements.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
---
2-
title: Define agreements between partners in workflows
3-
description: Add agreements between partners in your integration account for workflows in Azure Logic Apps using the Enterprise Integration Pack.
4-
services: logic-apps
2+
title: Define Agreements Between Partners in B2B Workflows
3+
description: Add agreements between partners to your integration account for B2B workflows in Azure Logic Apps.
4+
services: azure-logic-apps
55
ms.suite: integration
66
author: divyaswarnkar
77
ms.author: divswa
8-
ms.reviewer: estfan, azla
8+
ms.reviewers: estfan, azla
99
ms.topic: how-to
10-
ms.date: 02/20/2025
10+
ms.update-cycle: 1095-days
11+
ms.date: 03/13/2026
12+
# Customer intent: As a B2B integration developer who works with Azure Logic Apps, I want to define agreements between the trading partners as artifacts in an integration account.
1113
---
1214

1315
# Add agreements between partners in integration accounts for workflows in Azure Logic Apps
@@ -24,34 +26,32 @@ After you add partners to your integration account, specify how partners exchang
2426

2527
An agreement requires a *host partner*, which is always your organization, and a *guest partner*, which is the organization that exchanges messages with your organization. The guest partner can be another company, or even a department in your own organization. Using this agreement, you specify how to handle inbound and outbound messages from the host partner's perspective.
2628

27-
This article shows how to create and manage an agreement, which you can then use to exchange B2B messages with another partner by using the AS2, X12, EDIFACT, or RosettaNet operations.
29+
This guide shows how to create and manage an agreement, which you can then use to exchange B2B messages with another partner by using the AS2, X12, EDIFACT, or RosettaNet operations.
2830

29-
If you're new to logic apps, review [What is Azure Logic Apps](logic-apps-overview.md)? For more information about B2B enterprise integration, review [B2B enterprise integration workflows with Azure Logic Apps and Enterprise Integration Pack](logic-apps-enterprise-integration-overview.md).
31+
For more information, see:
3032

31-
## Prerequisites
33+
- [B2B enterprise integration workflows with Azure Logic Apps](logic-apps-enterprise-integration-overview.md)
34+
- [Create and manage integration accounts for B2B workflows](enterprise-integration/create-integration-account.md)
35+
- [Add agreements between partners](logic-apps-enterprise-integration-agreements.md)
3236

33-
* An Azure account and subscription. If you don't have a subscription yet, [sign up for a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
37+
## Prerequisites
3438

35-
* An [integration account resource](logic-apps-enterprise-integration-create-integration-account.md) where you define and store artifacts, such as trading partners, agreements, certificates, and so on, for use in your enterprise integration and B2B workflows. This resource has to meet the following requirements:
39+
* An Azure account and subscription. [Get a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
3640

37-
* Is associated with the same Azure subscription as your logic app resource.
41+
* An [integration account resource](logic-apps-enterprise-integration-create-integration-account.md) where you define and store artifacts, such as trading partners, agreements, certificates, and so on, for use in your enterprise integration and B2B workflows.
3842

39-
* Exists in the same location or Azure region as your logic app resource.
43+
This resource needs to meet the following requirements:
4044

41-
* If you're using the [**Logic App (Consumption)** resource type](logic-apps-overview.md#resource-environment-differences), your integration account requires a [link to your logic app resource](logic-apps-enterprise-integration-create-integration-account.md#link-account) before you can use artifacts in your workflow.
45+
* Use the same Azure subscription and location or Azure region as your logic app resource.
4246

43-
* If you're using the [**Logic App (Standard)** resource type](logic-apps-overview.md#resource-environment-differences), your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the [AS2](logic-apps-enterprise-integration-as2.md), [X12](logic-apps-enterprise-integration-x12.md), and [EDIFACT](logic-apps-enterprise-integration-edifact.md) operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
47+
* If you have a [Consumption logic app resource](logic-apps-overview.md#resource-environment-differences), your integration account requires a [link to your logic app resource](logic-apps-enterprise-integration-create-integration-account.md#link-account) before you can use artifacts in your workflow.
4448

45-
> [!NOTE]
46-
> Currently, only the **Logic App (Consumption)** resource type supports [RosettaNet](logic-apps-enterprise-integration-rosettanet.md) operations.
47-
> The **Logic App (Standard)** resource type doesn't include [RosettaNet](logic-apps-enterprise-integration-rosettanet.md) operations.
49+
* If you have a [Standard logic app resource](logic-apps-overview.md#resource-environment-differences), your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the [AS2](logic-apps-enterprise-integration-as2.md), [X12](logic-apps-enterprise-integration-x12.md), and [EDIFACT](logic-apps-enterprise-integration-edifact.md) operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
4850

4951
* At least two [trading partners](logic-apps-enterprise-integration-partners.md) in your integration account. An agreement requires a host partner and a guest partner. Also, an agreement requires that both partners use the same or compatible *business identity* qualifier that's appropriate for an AS2, X12, EDIFACT, or RosettaNet agreement.
5052

5153
* Optionally, the logic app resource and workflow where you want to use the agreement to exchange messages. The workflow requires any trigger that starts your logic app's workflow.
5254

53-
If you're new to logic apps, review [What is Azure Logic Apps](logic-apps-overview.md) and [Create an example Consumption logic app workflow](quickstart-create-example-consumption-workflow.md).
54-
5555
## Add an agreement
5656

5757
1. In the [Azure portal](https://portal.azure.com) search box, enter `integration accounts`, and select **Integration accounts**.

articles/logic-apps/logic-apps-enterprise-integration-b2b-business-continuity.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,16 @@
11
---
2-
title: Disaster recovery for integration accounts
3-
description: Set up integration accounts and B2B artifacts for cross-region disaster recovery in Azure Logic Apps.
2+
title: Disaster Recovery for Integration Accounts
3+
description: Set up cross-region disaster recovery for integration accounts and B2B artifacts in Azure Logic Apps.
44
services: logic-apps
55
ms.suite: integration
66
author: divyaswarnkar
77
ms.author: divswa
8-
ms.reviewer: estfan, azla
8+
ms.reviewers: estfan, azla
99
ms.topic: how-to
10-
ms.date: 02/20/2025
10+
ms.update-cycle: 1095-days
11+
ms.date: 03/13/2026
1112
ms.custom: sfi-image-nochange
13+
# Customer intent: As a B2B integration developer who works with Azure Logic Apps, I want to set up cross-region disaster recovery for my integration accounts and B2B artifacts.
1214
---
1315

1416
# Set up cross-region disaster recovery for integration accounts in Azure Logic Apps
@@ -310,6 +312,7 @@ and choose **Create**.
310312
Based on the time interval, the trigger polls the primary region
311313
table and pulls the new records. The action updates them to the
312314
secondary region integration account.
315+
313316
If there are no updates, the trigger status appears as **Skipped**.
314317

315318
![Primary region table](./media/logic-apps-enterprise-integration-b2b-business-continuity/as2messageid8.png)
@@ -319,6 +322,6 @@ replicates from the primary region to the secondary region.
319322
During a disaster event, when the primary region is not available,
320323
direct traffic to the secondary region for business continuity.
321324

322-
## Next steps
325+
## Related content
323326

324327
[Monitor B2B messages with Azure Monitor logs](../logic-apps/monitor-b2b-messages-log-analytics.md)

0 commit comments

Comments
 (0)