Skip to content

Commit 1adbc84

Browse files
Merge pull request #304815 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-28 17:00 UTC
2 parents 6098362 + 96b1383 commit 1adbc84

32 files changed

+659
-115
lines changed

articles/api-management/observability.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: azure-api-management
88
ms.topic: concept-article
9-
ms.date: 02/10/2025
9+
ms.date: 08/26/2025
1010
ms.author: danlep
1111
---
1212

@@ -27,21 +27,20 @@ The following table summarizes all the observability capabilities supported by A
2727
> [!NOTE]
2828
> For API consumers who use the developer portal, a built-in API report is available. It only provides information about their individual API usage during the preceding 90 days. Currently, the built-in API report isn't available in the developer portal for the v2 service tiers.
2929
>
30-
| Tool | Useful for | Data lag | Retention | Sampling | Data kind | Supported Deployment Model(s) |
30+
| Tool | Useful for | Data lag<sup>4</sup> | Retention | Sampling | Data kind | Supported Deployment Model(s) |
3131
|:------------- |:-------------|:---- |:----|:---- |:--- |:---- |
32-
| **[API Inspector](api-management-howto-api-inspector.md)** | Testing and debugging | Instant | Last 100 traces | Turned on per request | Request traces | Managed, Self-hosted, Azure Arc, Workspace |
32+
| **[Request tracing (API Inspector)](api-management-howto-api-inspector.md)** | Testing and debugging | Instant | Last 100 traces | Turned on per request | Request traces | Managed, Self-hosted, Azure Arc, Workspace |
3333
| **[Built-in Analytics](monitor-api-management.md#get-api-analytics-in-azure-api-management)** | Reporting and monitoring | Minutes | Lifetime | 100% | Reports and logs | Managed |
3434
| **[Azure Monitor Metrics](monitor-api-management-reference.md#metrics)** | Reporting and monitoring | Minutes | 90 days (upgrade to extend) | 100% | Metrics | Managed, Self-hosted<sup>2</sup>, Azure Arc |
3535
| **[Azure Monitor Logs](monitor-api-management-reference.md#resource-logs)** | Reporting, monitoring, and debugging | Minutes | 31 days/5GB (upgrade to extend) | 100% (adjustable) | Logs | Managed<sup>1</sup>, Self-hosted<sup>3</sup>, Azure Arc<sup>3</sup> |
3636
| **[Azure Application Insights](api-management-howto-app-insights.md)** | Reporting, monitoring, and debugging | Seconds | 90 days/5GB (upgrade to extend) | Custom | Logs, metrics | Managed<sup>1</sup>, Self-hosted<sup>1</sup>, Azure Arc<sup>1</sup>, Workspace<sup>1</sup> |
3737
| **[Logging through Azure Event Hubs](api-management-howto-log-event-hubs.md)** | Custom scenarios | Seconds | User managed | Custom | Custom | Managed<sup>1</sup>, Self-hosted<sup>1</sup>, Azure Arc<sup>1</sup> |
3838
| **[OpenTelemetry](how-to-deploy-self-hosted-gateway-kubernetes-opentelemetry.md#introduction-to-opentelemetry)** | Monitoring | Minutes | User managed | 100% | Metrics | Self-hosted<sup>2</sup> |
3939

40-
*1. Optional, depending on the configuration of feature in Azure API Management*
41-
42-
*2. Optional, depending on the configuration of the gateway*
43-
44-
*3. The [self-hosted gateway](self-hosted-gateway-overview.md) currently doesn't send diagnostic logs to Azure Monitor. However, it's possible to configure and persist logs locally where the self-hosted gateway is deployed. For more information, please see [configuring local metrics and logs for self-hosted gateway](how-to-configure-local-metrics-logs.md)*
40+
<sup>1</sup> Optional, depending on the configuration of feature in Azure API Management.<br/>
41+
<sup>2</sup> Optional, depending on the configuration of the gateway.<br/>
42+
<sup>3</sup> The [self-hosted gateway](self-hosted-gateway-overview.md) currently doesn't send diagnostic logs to Azure Monitor. However, it's possible to configure and persist logs locally where the self-hosted gateway is deployed. For more information, see [configuring local metrics and logs for self-hosted gateway](how-to-configure-local-metrics-logs.md).<br/>
43+
<sup>4</sup> Except for request tracing, all logging in API Management occurs asynchronously.
4544

4645
## Related content
4746

articles/app-service/monitor-app-service-reference.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,13 +73,11 @@ The following table lists more information about resource logs you can collect f
7373
| AppServiceEnvironmentPlatformLogs | Yes | N/A | Yes | Yes | App Service Environment: scaling, configuration changes, and status logs|
7474
| AppServiceAuditLogs | Yes | Yes | Yes | Yes | Login activity via FTP and Kudu |
7575
| AppServiceFileAuditLogs | Yes | Yes | TBA | TBA | File changes made to the site content; **only available for Premium tier and above** |
76-
| AppServiceAppLogs | ASP.NET | ASP.NET | Java SE & Tomcat Images <sup>1</sup> | Java SE & Tomcat Blessed Images <sup>1</sup> | Application logs |
76+
| AppServiceAppLogs | ASP.NET | ASP.NET | Java SE & Tomcat Images | Java SE & Tomcat Images | Java and Tomcat are supported in their default configuration. [Additional code and/or configuration might be required for some logging frameworks](https://github.com/Azure-Samples/SpringBoot3Log4j2AppSvcLogs). |
7777
| AppServiceIPSecAuditLogs | Yes | Yes | Yes | Yes | Requests from IP Rules |
7878
| AppServicePlatformLogs | TBA | Yes | Yes | Yes | Container operation logs |
7979
| AppServiceAntivirusScanAuditLogs | Yes | Yes | Yes | Yes | [Anti-virus scan logs](https://azure.github.io/AppService/2020/12/09/AzMon-AppServiceAntivirusScanAuditLogs.html) using Microsoft Defender for Cloud; **only available for Premium tier** |
8080

81-
<sup>1</sup> For Java SE apps, add "$WEBSITE_AZMON_PREVIEW_ENABLED" to the app settings and set it to 1 or to true.
82-
8381
[!INCLUDE [horz-monitor-ref-logs-tables](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-logs-tables.md)]
8482
### App Services
8583

@@ -125,4 +123,4 @@ The following table lists common activity log operations related to App Service.
125123
## Related content
126124

127125
- See [Monitor App Service](monitor-app-service.md) for a description of monitoring App Service.
128-
- See [Monitor Azure resources with Azure Monitor](/azure/azure-monitor/essentials/monitor-azure-resource) for details on monitoring Azure resources.
126+
- See [Monitor Azure resources with Azure Monitor](/azure/azure-monitor/essentials/monitor-azure-resource) for details on monitoring Azure resources.

articles/azure-fluid-relay/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
title: Azure Fluid Relay
88
description: Azure Fluid Relay is a managed cloud service that supports Fluid Framework Clients
99
ms.service: azure-fluid
10-
ms.author: mahgarg
10+
ms.author: pranshukumar
1111
ms.topic: landing-page
1212
ms.date: 08/19/2023
1313

articles/azure-netapp-files/data-protection-disaster-recovery-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: anfdocs
1313

1414
Learn about the different data protection and disaster recovery features in Azure NetApp Files and understand what solutions best serve your needs.
1515

16-
## On-Disk data protection
16+
## On-disk data protection
1717

1818
Azure NetApp Files Flexible, Standard, Premium and Ultra service levels are built on a [fault-tolerant bare-metal fleet powered by ONTAP®](azure-netapp-files-introduction.md#simplicity-and-availability), delivering enterprise-grade resilience, and uses RAID-DP® (Double Parity RAID) to safeguard data against disk failures. This mechanism distributes parity across multiple disks, enabling seamless data recovery even if two disks fail simultaneously. RAID-DP has a long-standing presence in the enterprise storage industry and is recognized for its proven reliability and fault tolerance.
1919

articles/azure-vmware/native-auto-peering-sync.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,10 @@ Ensures that virtual machines hosted in Azure VMware Solution can securely and c
3434

3535
---
3636

37+
## Prerequisite
38+
39+
- Ensure the "Microsoft.BareMetal" resource provider is registered.
40+
3741
## Deployment steps
3842

3943
1. Deploy your Azure VMware Solution private cloud.

articles/azure-vmware/native-create-azure-vmware-virtual-network-private-cloud.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,10 @@ With this generation, you can directly create the private cloud using the AV64 S
2121

2222
Before you begin, these items are required to create an Azure VMware Solution Gen 2 private cloud:
2323

24+
- Read through the [Gen 2 design considerations](native-network-design-consideration.md) before deploying your private cloud.
2425
- Enable the Azure VMware Solution Fleet Rp Service Principal as described in the [enable Azure VMware Solution Fleet Rp service Principal](native-first-party-principle-security.md).
2526
- Ensure you have appropriate administrative rights and permission to create a private cloud. You must be at minimum Owner or User Access Administrator on the subscription.
26-
- Hosts provisioned and the "Microsoft.AVS" resource provider is registered.
27+
- Hosts provisioned and the "Microsoft.AVS" and "Microsoft.BareMetal" resource provider is registered.
2728
- Deploy or use an existing Azure Virtual Network with a minimum network address space of a /22 or four /24s.
2829
- The newly created Azure Virtual Network and your Azure VMware Solution Gen 2 private cloud must be in the same Resource Group.
2930
- Ensure you have sufficient AV64 quota allocated to your subscription in the desired region before your deployment.

articles/azure-vmware/native-first-party-principle-security.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -69,12 +69,13 @@ If customers **delete either application ID** (for example, during a tenant clea
6969
7070
To help customers quickly identify issues, we added an **error check** that validates the presence of both apps. If either app is missing or disabled, the error message clearly indicates the required fix and provides a link back to this documentation for guidance.
7171
72-
> [!Important:]
73-
> Always verify both applications are enabled before deploying or troubleshooting an Azure VMware Solution Gen 2 private cloud.
74-
72+
> [!IMPORTANT]
73+
> Always verify both applications are enabled before deploying or troubleshooting an Azure VMware Solution Gen 2
7574
7675
## Next steps
7776
77+
- Review steps to [enable role assignments for your identifies if they are removed](native-role-assignment.md)
78+
7879
- Follow a tutorial for [Creating an Azure VMware Gen 2 private cloud](native-create-azure-vmware-virtual-network-private-cloud.md)
7980
8081
- Learn more about [Azure VMware Solution Gen 2 private cloud design considerations](native-network-design-consideration.md)

articles/azure-vmware/native-introduction.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@ ms.author: jacobjaygbay
1111
# customer intent: As a cloud administrator, I want to learn about Azure VMware Solution Gen 2 private clouds so that I can understand the features and benefits of this offering.
1212
# Customer intent: As a cloud administrator, I want to understand the features and benefits of Azure VMware Solution Generation 2 private clouds so that I can make informed decisions about deploying and managing cost-effective, secure, and high-performance cloud architectures in Azure.
1313
---
14-
1514
# Introduction to Azure VMware Solution Generation 2 Private Clouds
1615

1716
Azure VMware Solution Generation 2 (Gen 2) private clouds can now be deployed inside an Azure Virtual Network, conforming Azure VMware Solution to Azure networking standards. This architecture simplifies networking architecture, enhances data transfer speeds, reduces latency for workloads, and improves performance when accessing other Azure services. Users can now deploy Azure VMware Solution private clouds with the AV64 SKU directly, eliminating the need for a minimum of 3-host AV36, AV36P, AV48, or AV52 seed cluster. A minimum 3-host AV64 cluster is still required. The same Azure VMware Solution limits apply as described in [Scale clusters in a Private Cloud](tutorial-scale-private-cloud.md).
@@ -22,7 +21,7 @@ Azure VMware Solution Generation 2 (Gen 2) private clouds can now be deployed in
2221

2322
The following table summarizes the differences between Gen 1 and Gen 2 private clouds:
2423

25-
| Feature | Azure VMware Solution Gen 1 private clouds | Azure VMware Solution Gen 2 private clouds |
24+
| Feature | Gen 1 | Gen 2 |
2625
|-----------------------|-----------------------------------------------|--------------------------------------------------|
2726
| Supported SKU type | <ul><li>AV36, AV36P, AV52, AV48</li><li>AV64 (with seed cluster of at least three AV36, AV36P, AV48, or AV52 nodes)</li></ul>| <ul><li>Minimum 3-host AV64 cluster</li></ul>|
2827
| Network Attach Model | <ul><li>ExpressRoute</li></ul> | <ul><li>Virtual Network</li></ul> |

0 commit comments

Comments
 (0)