You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/connectors/sap-create-example-scenario-workflows.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,23 @@
1
1
---
2
-
title: Create common SAP workflows
3
-
description: Build workflows for common SAP scenarios in Azure Logic Apps.
4
-
services: logic-apps
2
+
title: Create Common SAP Integration Workflows
3
+
description: Build integration workflows for common SAP integration scenarios by using workflows in Azure Logic Apps.
4
+
services: azure-logic-apps
5
5
ms.suite: integration
6
6
author: daviburg
7
7
ms.author: daviburg
8
-
ms.reviewer: estfan, azla
8
+
ms.reviewers: estfan, azla
9
9
ms.topic: how-to
10
-
ms.date: 02/12/2025
10
+
ms.update-cycle: 1095-days
11
+
ms.date: 03/13/2026
11
12
ms.custom: sfi-ropc-nochange
12
-
#As an integration solution developer, I want to learn how I can build automated workflows that perform tasks with SAP resources.
13
+
#Customer intent: As an SAP integration solution developer who works with Azure Logic Apps, I want to create automation and integration workflows that perform tasks with SAP resources.
13
14
---
14
15
15
16
# Create workflows for common SAP integration scenarios in Azure Logic Apps
This how-to guide shows how to create example logic app workflows for some common SAP integration scenarios using Azure Logic Apps and the SAP connector.
20
+
This guide shows how to create example logic app workflows for some common SAP integration scenarios using Azure Logic Apps and the SAP connector.
20
21
21
22
Both Standard and Consumption logic app workflows offer the SAP *managed* connector that's hosted and run in multitenant Azure. Standard workflows also offer the SAP *built-in service provider* connector that's hosted and run in single-tenant Azure Logic Apps. For more information, see [Connector technical reference](sap.md#connector-technical-reference).
Copy file name to clipboardExpand all lines: articles/logic-apps/healthy-unhealthy-resource.md
+35-19Lines changed: 35 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,25 +1,33 @@
1
1
---
2
-
title: Set up logging to monitor logic apps in Azure Security Center
3
-
description: Monitor health for Azure Logic Apps resources in Azure Security Center by setting up diagnostic logging.
4
-
services: logic-apps
2
+
title: Monitor Resource Health with Defender for Cloud
3
+
description: Monitor resource health for Azure Logic Apps by setting up diagnostic logging with Microsoft Defender for Cloud in Azure Security Center.
4
+
services: azure-logic-apps
5
5
ms.suite: integration
6
-
ms.reviewer: estfan, azla
6
+
ms.reviewers: estfan, azla
7
7
ms.topic: how-to
8
-
ms.date: 02/20/2025
8
+
ms.update-cycle: 1095-days
9
+
ms.date: 03/13/2026
10
+
# Customer intent: As an integration developer who works with Azure Logic Apps, I want to set up resource health monitoring and diagnostic logging with Microsoft Defender for Cloud in Azure Security Center.
9
11
---
10
12
11
-
# Set up logging to monitor logic apps in Microsoft Defender for Cloud
13
+
# Monitor resource health for Azure Logic Apps by setting up logging in Azure Security Center
12
14
13
-
When you monitor your Azure Logic Apps resources in [Microsoft Azure Security Center](../security-center/security-center-introduction.md), you can [review whether your logic apps are following the default policies](#view-logic-apps-health-status). Azure shows the health status for an Azure Logic Apps resource after you enable logging and correctly set up the logs' destination. This article explains how to configure diagnostic logging and make sure that all your logic apps are healthy resources.
15
+
When you monitor your Azure Logic Apps resources by using with Microsoft Defender for Cloud in Microsoft Azure Security Center, you can check whether your logic apps follow default policies. Azure shows the health status for a resource in Azure Logic Apps after you enable logging and correctly set up the logs' destination.
16
+
17
+
This guide shows how to configure diagnostic logging and make sure that all your logic apps are healthy resources.
18
+
19
+
For more information, see:
20
+
21
+
-[Microsoft Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction)
> To find the current status for the Azure Logic Apps service, review the
18
-
> [Azure status page](https://azure.status.microsoft/), which lists the status for different products and services in each available region.
25
+
>
26
+
> To find the current status for the Azure Logic Apps service, visit the [Azure status page](https://azure.status.microsoft/). This page lists the statuses for different products and services in each available region.
19
27
20
28
## Prerequisites
21
29
22
-
* An Azure subscription. If you don't have a subscription, [create a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
30
+
* An Azure subscription. [Get a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
23
31
24
32
* Existing logic apps with [diagnostic logging enabled](#enable-diagnostic-logging).
25
33
@@ -30,28 +38,31 @@ When you monitor your Azure Logic Apps resources in [Microsoft Azure Security Ce
30
38
Before you can view the resource health status for your logic apps, you must first [set up diagnostic logging](monitor-workflows-collect-diagnostic-data.md). If you already have a Log Analytics workspace, you can enable logging either when you create your logic app or on existing logic apps.
31
39
32
40
> [!TIP]
41
+
>
33
42
> The default recommendation is to enable diagnostic logs for Azure Logic Apps. However, you control this setting for your logic apps. When you enable diagnostic logs for your logic apps, you can use the information to help analyze security incidents.
34
43
35
44
### Check diagnostic logging setting
36
45
37
46
If you're not sure whether your logic apps have diagnostic logging enabled, you can check in Defender for Cloud:
38
47
39
-
1. Sign in to the [Azure portal](https://portal.azure.com).
40
-
1. In the search bar, enter and select **Defender for Cloud**.
48
+
1. In the [Azure portal](https://portal.azure.com) search bar, enter and select **Defender for Cloud**.
41
49
1. On the workload protection dashboard menu, under **General**, select **Recommendations**.
42
-
1. In the table of security suggestions, find and select **Enable auditing and logging**>**Diagnostic logs in Logic Apps should be enabled** in the table of security controls.
43
-
1. On the recommendation page, expand the **Remediation steps** section and review the options. You can enable Azure Logic Apps diagnostics by selecting the **Quick Fix!** button, or by following the manual remediation instructions.
50
+
1. In the table of security suggestions, find the table of security controls.
51
+
1. Find and select **Enable auditing and logging**>**Diagnostic logs in Logic Apps should be enabled**.
52
+
1. On the recommendation page, expand the **Remediation steps** section and review the options.
53
+
1. Enable Azure Logic Apps diagnostics by selecting the **Quick Fix!** button, or by following the manual remediation instructions.
44
54
45
55
## View logic apps' health status
46
56
47
-
After you've [enabled diagnostic logging](#enable-diagnostic-logging), you can see the health status of your logic apps in Defender for Cloud.
57
+
After you[enable diagnostic logging](#enable-diagnostic-logging), you can see the health status of your logic apps in Defender for Cloud.
48
58
49
-
1. Sign in to the [Azure portal](https://portal.azure.com).
50
-
1. In the search bar, enter and select **Defender for Cloud**.
59
+
1. In the [Azure portal](https://portal.azure.com) search bar, enter and select **Defender for Cloud**.
51
60
1. On the workload protection dashboard menu, under **General**, select **Inventory**.
52
-
1. On the inventory page, filter your assets list to show only Azure Logic Apps resources. In the page menu, select **Resource types**>**logic apps**.
61
+
1. On the inventory page, filter your assets list to show only Azure Logic Apps resources.
62
+
1. From the page menu, select **Resource types**>**logic apps**.
53
63
54
64
The **Unhealthy Resources** counter shows the number of logic apps that Defender for Cloud considers unhealthy.
65
+
55
66
1. In the list of logic apps resources, review the **Recommendations** column. To review the health details for a specific logic app, select a resource name, or select the ellipses button (**...**) >**View resource**.
56
67
1. To remediate any potential resource health issues, follow the steps listed for your logic apps.
57
68
@@ -123,3 +134,8 @@ If you use a storage account as the destination for your Azure Logic Apps diagno
123
134
}
124
135
]
125
136
```
137
+
138
+
# Related content
139
+
140
+
-[Monitor Standard workflow health with Health Check](monitor-health-standard-workflows.md)
141
+
-[Monitor workflows in Azure Logic Apps](monitor-logic-apps-overview.md)
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-batch-process-send-receive-messages.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,7 @@ Now create one or more batch sender logic app workflows that send messages to th
133
133
134
134
* Make sure that you previously [created and deployed your batch receiver](#batch-receiver) so when you create your batch sender, you can select the existing batch receiver as the destination batch. While batch receivers don't need to know anything about batch senders, batch senders must know where to send messages.
135
135
136
-
* Make sure that your batch receiver and batch sender share the same Azure region *and* Azure subscription. If they don't, you can't select the batch receiver when you create the batch sender because they're not visible to each other.
136
+
* Make sure that your batch receiver and batch sender both share the same Azure region *and* Azure subscription. If they don't, you can't select the batch receiver when you create the batch sender because they're not visible to each other.
137
137
138
138
1. Create another logic app resource and workflow named **BatchSender**.
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-enterprise-integration-agreements.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,15 @@
1
1
---
2
-
title: Define agreements between partners in workflows
3
-
description: Add agreements between partners in your integration account for workflows in Azure Logic Apps using the Enterprise Integration Pack.
4
-
services: logic-apps
2
+
title: Define Agreements Between Partners in B2B Workflows
3
+
description: Add agreements between partners to your integration account for B2B workflows in Azure Logic Apps.
4
+
services: azure-logic-apps
5
5
ms.suite: integration
6
6
author: divyaswarnkar
7
7
ms.author: divswa
8
-
ms.reviewer: estfan, azla
8
+
ms.reviewers: estfan, azla
9
9
ms.topic: how-to
10
-
ms.date: 02/20/2025
10
+
ms.update-cycle: 1095-days
11
+
ms.date: 03/13/2026
12
+
# Customer intent: As a B2B integration developer who works with Azure Logic Apps, I want to define agreements between the trading partners as artifacts in an integration account.
11
13
---
12
14
13
15
# Add agreements between partners in integration accounts for workflows in Azure Logic Apps
@@ -24,34 +26,32 @@ After you add partners to your integration account, specify how partners exchang
24
26
25
27
An agreement requires a *host partner*, which is always your organization, and a *guest partner*, which is the organization that exchanges messages with your organization. The guest partner can be another company, or even a department in your own organization. Using this agreement, you specify how to handle inbound and outbound messages from the host partner's perspective.
26
28
27
-
This article shows how to create and manage an agreement, which you can then use to exchange B2B messages with another partner by using the AS2, X12, EDIFACT, or RosettaNet operations.
29
+
This guide shows how to create and manage an agreement, which you can then use to exchange B2B messages with another partner by using the AS2, X12, EDIFACT, or RosettaNet operations.
28
30
29
-
If you're new to logic apps, review [What is Azure Logic Apps](logic-apps-overview.md)? For more information about B2B enterprise integration, review [B2B enterprise integration workflows with Azure Logic Apps and Enterprise Integration Pack](logic-apps-enterprise-integration-overview.md).
31
+
For more information, see:
30
32
31
-
## Prerequisites
33
+
-[B2B enterprise integration workflows with Azure Logic Apps](logic-apps-enterprise-integration-overview.md)
34
+
-[Create and manage integration accounts for B2B workflows](enterprise-integration/create-integration-account.md)
35
+
-[Add agreements between partners](logic-apps-enterprise-integration-agreements.md)
32
36
33
-
* An Azure account and subscription. If you don't have a subscription yet, [sign up for a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
37
+
## Prerequisites
34
38
35
-
* An [integration account resource](logic-apps-enterprise-integration-create-integration-account.md) where you define and store artifacts, such as trading partners, agreements, certificates, and so on, for use in your enterprise integration and B2B workflows. This resource has to meet the following requirements:
39
+
* An Azure account and subscription. [Get a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
36
40
37
-
* Is associated with the same Azure subscription as your logic app resource.
41
+
* An [integration account resource](logic-apps-enterprise-integration-create-integration-account.md) where you define and store artifacts, such as trading partners, agreements, certificates, and so on, for use in your enterprise integration and B2B workflows.
38
42
39
-
* Exists in the same location or Azure region as your logic app resource.
43
+
This resource needs to meet the following requirements:
40
44
41
-
*If you're using the [**Logic App (Consumption)** resource type](logic-apps-overview.md#resource-environment-differences), your integration account requires a [link to your logic app resource](logic-apps-enterprise-integration-create-integration-account.md#link-account) before you can use artifacts in your workflow.
45
+
*Use the same Azure subscription and location or Azure region as your logic app resource.
42
46
43
-
* If you're using the [**Logic App (Standard)** resource type](logic-apps-overview.md#resource-environment-differences), your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the [AS2](logic-apps-enterprise-integration-as2.md), [X12](logic-apps-enterprise-integration-x12.md), and [EDIFACT](logic-apps-enterprise-integration-edifact.md) operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
47
+
* If you have a [Consumption logic app resource](logic-apps-overview.md#resource-environment-differences), your integration account requires a [link to your logic app resource](logic-apps-enterprise-integration-create-integration-account.md#link-account) before you can use artifacts in your workflow.
44
48
45
-
> [!NOTE]
46
-
> Currently, only the **Logic App (Consumption)** resource type supports [RosettaNet](logic-apps-enterprise-integration-rosettanet.md) operations.
47
-
> The **Logic App (Standard)** resource type doesn't include [RosettaNet](logic-apps-enterprise-integration-rosettanet.md) operations.
49
+
* If you have a [Standard logic app resource](logic-apps-overview.md#resource-environment-differences), your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the [AS2](logic-apps-enterprise-integration-as2.md), [X12](logic-apps-enterprise-integration-x12.md), and [EDIFACT](logic-apps-enterprise-integration-edifact.md) operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
48
50
49
51
* At least two [trading partners](logic-apps-enterprise-integration-partners.md) in your integration account. An agreement requires a host partner and a guest partner. Also, an agreement requires that both partners use the same or compatible *business identity* qualifier that's appropriate for an AS2, X12, EDIFACT, or RosettaNet agreement.
50
52
51
53
* Optionally, the logic app resource and workflow where you want to use the agreement to exchange messages. The workflow requires any trigger that starts your logic app's workflow.
52
54
53
-
If you're new to logic apps, review [What is Azure Logic Apps](logic-apps-overview.md) and [Create an example Consumption logic app workflow](quickstart-create-example-consumption-workflow.md).
54
-
55
55
## Add an agreement
56
56
57
57
1. In the [Azure portal](https://portal.azure.com) search box, enter `integration accounts`, and select **Integration accounts**.
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-enterprise-integration-b2b-business-continuity.md
+8-5Lines changed: 8 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,16 @@
1
1
---
2
-
title: Disaster recovery for integration accounts
3
-
description: Set up integration accounts and B2B artifacts for cross-region disaster recovery in Azure Logic Apps.
2
+
title: Disaster Recovery for Integration Accounts
3
+
description: Set up cross-region disaster recovery for integration accounts and B2B artifacts in Azure Logic Apps.
4
4
services: logic-apps
5
5
ms.suite: integration
6
6
author: divyaswarnkar
7
7
ms.author: divswa
8
-
ms.reviewer: estfan, azla
8
+
ms.reviewers: estfan, azla
9
9
ms.topic: how-to
10
-
ms.date: 02/20/2025
10
+
ms.update-cycle: 1095-days
11
+
ms.date: 03/13/2026
11
12
ms.custom: sfi-image-nochange
13
+
# Customer intent: As a B2B integration developer who works with Azure Logic Apps, I want to set up cross-region disaster recovery for my integration accounts and B2B artifacts.
12
14
---
13
15
14
16
# Set up cross-region disaster recovery for integration accounts in Azure Logic Apps
@@ -310,6 +312,7 @@ and choose **Create**.
310
312
Based on the time interval, the trigger polls the primary region
311
313
table and pulls the new records. The action updates them to the
312
314
secondary region integration account.
315
+
313
316
If there are no updates, the trigger status appears as **Skipped**.
314
317
315
318

@@ -319,6 +322,6 @@ replicates from the primary region to the secondary region.
319
322
During a disaster event, when the primary region is not available,
320
323
direct traffic to the secondary region for business continuity.
321
324
322
-
## Next steps
325
+
## Related content
323
326
324
327
[Monitor B2B messages with Azure Monitor logs](../logic-apps/monitor-b2b-messages-log-analytics.md)
0 commit comments