Skip to content

Commit 1a6c2c1

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into mrb_03_13_2024_fix_redirect_issue
2 parents 210aeb9 + c77e720 commit 1a6c2c1

File tree

3 files changed

+30
-21
lines changed

3 files changed

+30
-21
lines changed

articles/azure-monitor/alerts/migrate-from-alerts-summary-api.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
11
---
2-
title: Migrate from the Azure Monitor alertsSummary API
3-
description: Find out how to migrate from the Azure Monitor alertsSummary API, which is being deprecated
2+
title: Use ARG queries to get a summary of your alerts
3+
description: Find out how to se ARG queries to migrate from the Azure Monitor alertsSummary API, which is being deprecated.
44
ms.topic: how-to
5-
ms.date: 09/21/2023
5+
ms.date: 03/13/2024
66
ms.author: abbyweisberg
77
ms.reviewer: nolavime
88
---
99

10-
# Migrate from the alertsSummary API to ARG queries
10+
# Use ARG queries to get a summary of your alerts
1111

12-
The [alertsSummary API](/rest/api/monitor/alertsmanagement/alerts/get-summary) is being deprecated as of September 30,2026. Instead of the alertsSummary API, you can use Azure Resource Graph queries to get the same information.
12+
Azure Resource Graph queries allow you to query your Azure data and can be used to get information about your Azure monitor alerts.
1313

14-
Azure Resource Graph queries provide flexibility to query your Azure data and can be used for Azure monitor alerts instead of the alertsSummary API.
14+
The [alertsSummary API](/rest/api/monitor/alertsmanagement/alerts/get-summary) is being deprecated as of September 30,2026. Instead of the alertsSummary API, you can use Azure Resource Graph queries to get the same information.
1515

1616
Azure Resource Graph queries provide more functionality than the alertsSummary API, including:
1717
* The ability to add new fields to the query that returns the alert summary.
18-
* The ability to be more flexible in the query that returns the alert summary.
18+
* More flexibility in the query that returns the alert summary.
1919

2020
## Implementation of the current alertsSummary API:
2121

@@ -62,7 +62,7 @@ This is an example of the output from the alertsSummary API:
6262
}
6363
```
6464

65-
## Use the Azure Resource Graph query
65+
## Use the Azure Resource Graph queries for Azure Monitor alerts
6666

6767
Use these Azure Resource Graph queries instead of the alertsSummary API call to retrieve alert information, or use these queries as a basis for designing your own queries.
6868

articles/azure-monitor/toc.yml

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1338,6 +1338,8 @@ items:
13381338
href: alerts/alerts-manage-alert-instances.md
13391339
- name: Update alerts for region moves
13401340
href: alerts/alerts-resource-move.md
1341+
- name: Query alerts using ARG
1342+
href: alerts/migrate-from-alerts-summary-api.md
13411343
- name: Tutorials
13421344
items:
13431345
- name: Create a metric alert
@@ -1566,8 +1568,13 @@ items:
15661568
items:
15671569
- name: Azure Monitor REST API index
15681570
href: azure-monitor-rest-api-index.md
1569-
- name: Migrate from the alertsSummary API
1570-
href: alerts/migrate-from-alerts-summary-api.md
1571+
- name: REST API Walkthrough
1572+
displayName: metrics, analyze
1573+
href: essentials/rest-api-walkthrough.md
1574+
- name: Activity log via REST API
1575+
href: essentials/rest-activity-log.md
1576+
- name: Migrate to the metrics getBatch API
1577+
href: essentials/migrate-to-batch-api.md
15711578
- name: Azure alerts management SDK for Python
15721579
href: /python/api/azure-mgmt-monitor/azure.mgmt.monitor.monitormanagementclient
15731580
- name: Resource Manager templates

articles/machine-learning/how-to-secure-kubernetes-inferencing-environment.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,18 +7,20 @@ ms.author: bozhlin
77
ms.reviewer: larryfr ssalgado
88
ms.service: machine-learning
99
ms.subservice: core
10-
ms.date: 08/31/2022
10+
ms.date: 03/11/2024
1111
ms.topic: how-to
1212
ms.custom: build-spring-2022, cliv2, sdkv2
1313
# Customer intent: I would like to have machine learning with all private IP only
1414
---
1515

1616
# Secure Azure Kubernetes Service inferencing environment
1717

18-
If you have an Azure Kubernetes (AKS) cluster behind of VNet, you would need to secure Azure Machine Learning workspace resources and a compute environment using the same or peered VNet. In this article, you'll learn:
18+
In this article, you'll learn:
1919
* What is a secure AKS inferencing environment
2020
* How to configure a secure AKS inferencing environment
2121

22+
If you have an Azure Kubernetes (AKS) cluster behind of VNet, you would need to secure Azure Machine Learning workspace resources and a compute environment using the same or peered VNet.
23+
2224
## Limitations
2325

2426
* If your AKS cluster is behind of a VNet, your workspace and its associated resources (storage, key vault, Azure Container Registry) must have private endpoints or service endpoints in the same or peered VNet as AKS cluster's VNet. For more information on securing the workspace and associated resources, see [create a secure workspace](tutorial-create-secure-workspace.md).
@@ -27,7 +29,7 @@ If you have an Azure Kubernetes (AKS) cluster behind of VNet, you would need to
2729

2830
## What is a secure AKS inferencing environment
2931

30-
Azure Machine Learning AKS inferencing environment consists of workspace, your AKS cluster, and workspace associated resources - Azure Storage, Azure Key Vault, and Azure Container Services(ARC). The following table compares how services access different part of Azure Machine Learning network with or without a VNet.
32+
Azure Machine Learning AKS inferencing environments consists of a workspace, your AKS cluster, and workspace associated resources - Azure Storage, Azure Key Vault, and Azure Container Services(ARC). The following table compares how services access different part of Azure Machine Learning network with or without a VNet.
3133

3234
| Scenario | Workspace | Associated resources (Storage account, Key Vault, ACR) | AKS cluster |
3335
|-|-|-|-|-|
@@ -41,17 +43,17 @@ In a secure AKS inferencing environment, AKS cluster accesses different part of
4143

4244
## How to configure a secure AKS inferencing environment
4345

44-
To configure a secure AKS inferencing environment, you must have VNet information for AKS. [VNet](../virtual-network/quick-create-portal.md) can be created independently or during AKS cluster deployment. There are two options for AKS cluster in a VNet:
45-
* Deploy default AKS cluster to your VNet
46-
* Or create private AKS cluster to your VNet
46+
To configure a secure AKS inferencing environment, you must have VNet information for AKS. [VNet](../virtual-network/quick-create-portal.md) can be created independently or during AKS cluster deployment. There are two options for an AKS cluster in a VNet:
47+
* Deploy a default AKS cluster to your VNet
48+
* Or create a private AKS cluster to your VNet
4749

48-
For default AKS cluster, you can find VNet information under the resource group of `MC_[rg_name][aks_name][region]`.
50+
For a default AKS cluster, you can find VNet information under the resource group of `MC_[rg_name][aks_name][region]`.
4951

50-
After you have VNet information for AKS cluster and if you already have workspace available, use following steps to configure a secure AKS inferencing environment:
52+
After you have the VNet information for an AKS cluster and an available workspace, use following steps to configure a secure AKS inferencing environment:
5153

52-
* Use your AKS cluster VNet information to add new private endpoints for the Azure Storage Account, Azure Key Vault, and Azure Container Registry used by your workspace. These private endpoints should exist in the same or peered VNet as AKS cluster. For more information, see the [secure workspace with private endpoint](./how-to-secure-workspace-vnet.md#secure-the-workspace-with-private-endpoint) article.
53-
* If you have other storage that is used by your Azure Machine Learning workloads, add a new private endpoint for that storage. The private endpoint should be in the same or peered VNet as AKS cluster and have private DNS zone integration enabled.
54-
* Add a new private endpoint to your workspace. This private endpoint should be in the same or peered VNet as your AKS cluster and have private DNS zone integration enabled.
54+
1. Use your AKS cluster VNet information to add new private endpoints for the Azure Storage Account, Azure Key Vault, and Azure Container Registry used by your workspace. These private endpoints should exist in the same or peered VNet as AKS cluster. For more information, see the [secure workspace with private endpoint](./how-to-secure-workspace-vnet.md#secure-the-workspace-with-private-endpoint) article.
55+
1. If you have other storage that is used by your Azure Machine Learning workloads, add a new private endpoint for that storage. The private endpoint should be in the same or peered VNet as AKS cluster and have private DNS zone integration enabled.
56+
1. Add a new private endpoint to your workspace. This private endpoint should be in the same or peered VNet as your AKS cluster and have private DNS zone integration enabled.
5557

5658
If you have AKS cluster ready but don't have workspace created yet, you can use AKS cluster VNet when creating the workspace. Use the AKS cluster VNet information when following the [create secure workspace](./tutorial-create-secure-workspace.md) tutorial. Once the workspace has been created, add a new private endpoint to your workspace as the last step. For all the above steps, it's important to ensure that all private endpoints should exist in the same AKS cluster VNet and have private DNS zone integration enabled.
5759

0 commit comments

Comments
 (0)