You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/observability.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: azure-api-management
8
8
ms.topic: concept-article
9
-
ms.date: 02/10/2025
9
+
ms.date: 08/26/2025
10
10
ms.author: danlep
11
11
---
12
12
@@ -27,21 +27,20 @@ The following table summarizes all the observability capabilities supported by A
27
27
> [!NOTE]
28
28
> For API consumers who use the developer portal, a built-in API report is available. It only provides information about their individual API usage during the preceding 90 days. Currently, the built-in API report isn't available in the developer portal for the v2 service tiers.
29
29
>
30
-
| Tool | Useful for | Data lag | Retention | Sampling | Data kind | Supported Deployment Model(s) |
30
+
| Tool | Useful for | Data lag<sup>4</sup> | Retention | Sampling | Data kind | Supported Deployment Model(s) |
*1. Optional, depending on the configuration of feature in Azure API Management*
41
-
42
-
*2. Optional, depending on the configuration of the gateway*
43
-
44
-
*3. The [self-hosted gateway](self-hosted-gateway-overview.md) currently doesn't send diagnostic logs to Azure Monitor. However, it's possible to configure and persist logs locally where the self-hosted gateway is deployed. For more information, please see [configuring local metrics and logs for self-hosted gateway](how-to-configure-local-metrics-logs.md)*
40
+
<sup>1</sup> Optional, depending on the configuration of feature in Azure API Management.<br/>
41
+
<sup>2</sup> Optional, depending on the configuration of the gateway.<br/>
42
+
<sup>3</sup> The [self-hosted gateway](self-hosted-gateway-overview.md) currently doesn't send diagnostic logs to Azure Monitor. However, it's possible to configure and persist logs locally where the self-hosted gateway is deployed. For more information, see [configuring local metrics and logs for self-hosted gateway](how-to-configure-local-metrics-logs.md).<br/>
43
+
<sup>4</sup> Except for request tracing, all logging in API Management occurs asynchronously.
Copy file name to clipboardExpand all lines: articles/app-service/monitor-app-service-reference.md
+2-4Lines changed: 2 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,13 +73,11 @@ The following table lists more information about resource logs you can collect f
73
73
| AppServiceEnvironmentPlatformLogs | Yes | N/A | Yes | Yes | App Service Environment: scaling, configuration changes, and status logs|
74
74
| AppServiceAuditLogs | Yes | Yes | Yes | Yes | Login activity via FTP and Kudu |
75
75
| AppServiceFileAuditLogs | Yes | Yes | TBA | TBA | File changes made to the site content; **only available for Premium tier and above**|
76
-
| AppServiceAppLogs | ASP.NET | ASP.NET | Java SE & Tomcat Images <sup>1</sup> | Java SE & Tomcat Blessed Images <sup>1</sup> | Application logs|
76
+
| AppServiceAppLogs | ASP.NET | ASP.NET | Java SE & Tomcat Images | Java SE & Tomcat Images | Java and Tomcat are supported in their default configuration. [Additional code and/or configuration might be required for some logging frameworks](https://github.com/Azure-Samples/SpringBoot3Log4j2AppSvcLogs).|
77
77
| AppServiceIPSecAuditLogs | Yes | Yes | Yes | Yes | Requests from IP Rules |
| AppServiceAntivirusScanAuditLogs | Yes | Yes | Yes | Yes |[Anti-virus scan logs](https://azure.github.io/AppService/2020/12/09/AzMon-AppServiceAntivirusScanAuditLogs.html) using Microsoft Defender for Cloud; **only available for Premium tier**|
80
80
81
-
<sup>1</sup> For Java SE apps, add "$WEBSITE_AZMON_PREVIEW_ENABLED" to the app settings and set it to 1 or to true.
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/data-protection-disaster-recovery-options.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.author: anfdocs
13
13
14
14
Learn about the different data protection and disaster recovery features in Azure NetApp Files and understand what solutions best serve your needs.
15
15
16
-
## On-Disk data protection
16
+
## On-disk data protection
17
17
18
18
Azure NetApp Files Flexible, Standard, Premium and Ultra service levels are built on a [fault-tolerant bare-metal fleet powered by ONTAP®](azure-netapp-files-introduction.md#simplicity-and-availability), delivering enterprise-grade resilience, and uses RAID-DP® (Double Parity RAID) to safeguard data against disk failures. This mechanism distributes parity across multiple disks, enabling seamless data recovery even if two disks fail simultaneously. RAID-DP has a long-standing presence in the enterprise storage industry and is recognized for its proven reliability and fault tolerance.
Copy file name to clipboardExpand all lines: articles/azure-vmware/native-create-azure-vmware-virtual-network-private-cloud.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,9 +21,10 @@ With this generation, you can directly create the private cloud using the AV64 S
21
21
22
22
Before you begin, these items are required to create an Azure VMware Solution Gen 2 private cloud:
23
23
24
+
- Read through the [Gen 2 design considerations](native-network-design-consideration.md) before deploying your private cloud.
24
25
- Enable the Azure VMware Solution Fleet Rp Service Principal as described in the [enable Azure VMware Solution Fleet Rp service Principal](native-first-party-principle-security.md).
25
26
- Ensure you have appropriate administrative rights and permission to create a private cloud. You must be at minimum Owner or User Access Administrator on the subscription.
26
-
- Hosts provisioned and the "Microsoft.AVS" resource provider is registered.
27
+
- Hosts provisioned and the "Microsoft.AVS" and "Microsoft.BareMetal" resource provider is registered.
27
28
- Deploy or use an existing Azure Virtual Network with a minimum network address space of a /22 or four /24s.
28
29
- The newly created Azure Virtual Network and your Azure VMware Solution Gen 2 private cloud must be in the same Resource Group.
29
30
- Ensure you have sufficient AV64 quota allocated to your subscription in the desired region before your deployment.
Copy file name to clipboardExpand all lines: articles/azure-vmware/native-first-party-principle-security.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,12 +69,13 @@ If customers **delete either application ID** (for example, during a tenant clea
69
69
70
70
To help customers quickly identify issues, we added an **error check** that validates the presence of both apps. If either app is missing or disabled, the error message clearly indicates the required fix and provides a link back to this documentation for guidance.
71
71
72
-
> [!Important:]
73
-
> Always verify both applications are enabled before deploying or troubleshooting an Azure VMware Solution Gen 2 private cloud.
74
-
72
+
> [!IMPORTANT]
73
+
> Always verify both applications are enabled before deploying or troubleshooting an Azure VMware Solution Gen 2
75
74
76
75
## Next steps
77
76
77
+
- Review steps to [enable role assignments for your identifies if they are removed](native-role-assignment.md)
78
+
78
79
- Follow a tutorial for [Creating an Azure VMware Gen 2 private cloud](native-create-azure-vmware-virtual-network-private-cloud.md)
79
80
80
81
- Learn more about [Azure VMware Solution Gen 2 private cloud design considerations](native-network-design-consideration.md)
Copy file name to clipboardExpand all lines: articles/azure-vmware/native-introduction.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,6 @@ ms.author: jacobjaygbay
11
11
# customer intent: As a cloud administrator, I want to learn about Azure VMware Solution Gen 2 private clouds so that I can understand the features and benefits of this offering.
12
12
# Customer intent: As a cloud administrator, I want to understand the features and benefits of Azure VMware Solution Generation 2 private clouds so that I can make informed decisions about deploying and managing cost-effective, secure, and high-performance cloud architectures in Azure.
13
13
---
14
-
15
14
# Introduction to Azure VMware Solution Generation 2 Private Clouds
16
15
17
16
Azure VMware Solution Generation 2 (Gen 2) private clouds can now be deployed inside an Azure Virtual Network, conforming Azure VMware Solution to Azure networking standards. This architecture simplifies networking architecture, enhances data transfer speeds, reduces latency for workloads, and improves performance when accessing other Azure services. Users can now deploy Azure VMware Solution private clouds with the AV64 SKU directly, eliminating the need for a minimum of 3-host AV36, AV36P, AV48, or AV52 seed cluster. A minimum 3-host AV64 cluster is still required. The same Azure VMware Solution limits apply as described in [Scale clusters in a Private Cloud](tutorial-scale-private-cloud.md).
@@ -22,7 +21,7 @@ Azure VMware Solution Generation 2 (Gen 2) private clouds can now be deployed in
22
21
23
22
The following table summarizes the differences between Gen 1 and Gen 2 private clouds:
24
23
25
-
| Feature |Azure VMware Solution Gen 1 private clouds | Azure VMware Solution Gen 2 private clouds |
| Supported SKU type | <ul><li>AV36, AV36P, AV52, AV48</li><li>AV64 (with seed cluster of at least three AV36, AV36P, AV48, or AV52 nodes)</li></ul>| <ul><li>Minimum 3-host AV64 cluster</li></ul>|
28
27
| Network Attach Model | <ul><li>ExpressRoute</li></ul> | <ul><li>Virtual Network</li></ul> |
0 commit comments