Skip to content

Commit 1ea56fd

Browse files
authored
Merge pull request #281857 from MicrosoftDocs/main
[Out of Band Publish] 7/25/2024 10:50 AM PST
2 parents ae670a2 + e6d7b7a commit 1ea56fd

32 files changed

+468
-243
lines changed

.openpublishing.redirection.json

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4878,6 +4878,13 @@
48784878
"redirect_document_id": false
48794879
},
48804880
{
4881+
4882+
"source_path_from_root": "/articles/backup/azure-backup-move-vaults-across-regions.md",
4883+
"redirect_url": "/azure/operational-excellence/relocation-backup",
4884+
"redirect_document_id": false
4885+
},
4886+
{
4887+
48814888
"source_path_from_root": "/articles/cosmos-db/how-to-move-regions.md",
48824889
"redirect_url": "/azure/operational-excellence/relocation-cosmos-db",
48834890
"redirect_document_id": false

articles/ai-services/openai/quotas-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ The following sections provide you with a quick guide to the default quotas and
6161

6262
|Tier| Quota Limit in tokens per minute (TPM) | Requests per minute |
6363
|---|:---:|:---:|
64-
|Enterprise agreement | 30 M | 60 K |
64+
|Enterprise agreement | 30 M | 180 K |
6565
|Default | 450 K | 2.7 K |
6666

6767
M = million | K = thousand

articles/ai-studio/concepts/fine-tuning-overview.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,7 @@ There isn't a single right answer to this question, but you should have clearly
9999

100100
Now that you know when to leverage fine-tuning for your use-case, you can go to Azure AI Studio to find several models available to fine-tune including:
101101
- Azure OpenAI models
102+
- Phi-3 family of models
102103
- Meta Llama 2 family models
103104
- Meta Llama 3.1 family of models
104105

@@ -119,22 +120,33 @@ The following Azure OpenAI models are supported in Azure AI Studio for fine-tuni
119120

120121
Please note for fine-tuning Azure OpenAI models, you must add a connection to an Azure OpenAI resource with a supported region to your project.
121122

123+
### Phi-3 family models
124+
The following Phi-3 family models are supported in Azure AI Studio for fine-tuning:
125+
- `Phi-3-mini-4k-instruct`
126+
- `Phi-3-mini-128k-instruct`
127+
- `Phi-3-medium-4k-instruct`
128+
- `Phi-3-medium-128k-instruct`
129+
130+
Fine-tuning of Phi-3 models is currently supported in projects located in East US2.
131+
122132
### Llama 2 family models
123133
The following Llama 2 family models are supported in Azure AI Studio for fine-tuning:
124134
- `Meta-Llama-2-70b`
125135
- `Meta-Llama-2-7b`
126136
- `Meta-Llama-2-13b`
127137

128-
Fine-tuning of Llama 2 models is currently supported in projects located in West US 3.
138+
Fine-tuning of Llama 2 models is currently supported in projects located in West US3.
129139

130140
### Llama 3.1 family models
131141
The following Llama 3.1 family models are supported in Azure AI Studio for fine-tuning:
132142
- `Meta-Llama-3.1-70b-Instruct`
133-
- `Meta-Llama-3.1-7b-Instruct`
143+
- `Meta-Llama-3.1-8b-Instruct`
134144

135-
Fine-tuning of Llama 3.1 models is currently supported in projects located in West US 3.
145+
Fine-tuning of Llama 3.1 models is currently supported in projects located in West US3.
136146

137147
## Related content
138148

139149
- [Learn how to fine-tune an Azure OpenAI model in Azure AI Studio](../../ai-services/openai/how-to/fine-tuning.md?context=/azure/ai-studio/context/context)
140150
- [Learn how to fine-tune a Llama 2 model in Azure AI Studio](../how-to/fine-tune-model-llama.md)
151+
- [Learn how to fine-tune a Phi-3 model in Azure AI Studio](../how-to/fine-tune-phi-3.md)
152+
- [How to deploy Phi-3 family of small language models with Azure AI Studio](../how-to/deploy-models-phi-3.md)

articles/ai-studio/how-to/deploy-models-llama.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ Meta Llama 3.1 models - like `Meta Llama 3.1 405B Instruct` - can be deployed as
4141

4242
The following models are available in Azure Marketplace for Llama 3.1 and Llama 3 when deployed as a service with pay-as-you-go:
4343

44-
* [Meta-Llama-3.1-405B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3-405B-base)
45-
* [Meta-Llama-3.1-70B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3-8B-refresh)
46-
* [Meta Llama-3.1-8B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3-70B-refresh)
44+
* [Meta-Llama-3.1-405B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3.1-405B-instruct)
45+
* [Meta-Llama-3.1-70B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3.1-70B-instruct)
46+
* [Meta Llama-3.1-8B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3.1-8B-instruct)
4747
* [Meta-Llama-3-70B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3-70b-chat)
4848
* [Meta-Llama-3-8B-Instruct (preview)](https://aka.ms/aistudio/landing/meta-llama-3-8b-chat)
4949

articles/ai-studio/how-to/fine-tune-phi-3.md

Lines changed: 206 additions & 0 deletions
Large diffs are not rendered by default.
16.4 KB
Loading

articles/ai-studio/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,8 @@ items:
129129
displayName: maas
130130
- name: Deploy Phi-3 models
131131
href: how-to/deploy-models-phi-3.md
132+
- name: Fine-tune Phi-3 models
133+
href: how-to/fine-tune-phi-3.md
132134
- name: Deploy TimeGEN-1 model
133135
href: how-to/deploy-models-timegen-1.md
134136
- name: Deploy open models

articles/aks/learn/quick-kubernetes-automatic-deploy.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,8 +120,7 @@ To create an AKS Automatic cluster, use the [az aks create][az-aks-create] comma
120120
az aks create \
121121
--resource-group myResourceGroup \
122122
--name myAKSAutomaticCluster \
123-
--sku automatic \
124-
--generate-ssh-keys
123+
--sku automatic
125124
```
126125

127126
After a few minutes, the command completes and returns JSON-formatted information about the cluster.

articles/azure-monitor/agents/azure-monitor-agent-troubleshoot-linux-vm.md

Lines changed: 2 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
2626
```
2727
3. Wait for 10-15 minutes as extension maybe in transitioning status. If it still doesn't show up as above, [uninstall and install the extension](./azure-monitor-agent-manage.md) again.
2828
4. Check if you see any errors in extension logs located at `/var/log/azure/Microsoft.Azure.Monitor.AzureMonitorLinuxAgent/` on your machine
29-
5. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'AMA extension fails to install or provision' and **Problem type** as 'I need help with Azure Monitor Linux Agent'.
3029
3130
3. **Verify that the agent is running**:
3231
1. Check if the agent is emitting heartbeat logs to Log Analytics workspace using the query below. Skip if 'Custom Metrics' is the only destination in the DCR:
@@ -37,19 +36,15 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
3736
```
3837
systemctl status azuremonitoragent
3938
```
40-
3. Check if you see any errors in core agent logs located at `/var/opt/microsoft/azuremonitoragent/log/mdsd.*` on your machine
41-
3. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'AMA extension provisioned but not running' and **Problem type** as 'I need help with Azure Monitor Linux Agent'.
39+
3. Check if you see any errors in core agent logs located at `/var/opt/microsoft/azuremonitoragent/log/mdsd.*` on your machine
4240
4341
4. **Verify that the DCR exists and is associated with the virtual machine:**
4442
1. If using Log Analytics workspace as destination, verify that DCR exists in the same physical region as the Log Analytics workspace.
4543
2. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** from the pane on the left > You should see the virtual machine listed here.
4644
3. If not listed, click 'Add' and select your virtual machine from the resource picker. Repeat across all DCRs.
47-
4. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'DCR not found or associated' and **Problem type** as 'I need help configuring data collection from a VM'.
4845
4946
5. **Verify that agent was able to download the associated DCR(s) from AMCS service:**
5047
1. Check if you see the latest DCR downloaded at this location `/etc/opt/microsoft/azuremonitoragent/config-cache/configchunks/`
51-
2. If not, [file a ticket](#file-a-ticket) with **Summary** as 'AMA unable to download DCR config' and **Problem type** as 'I need help with Azure Monitor Linux Agent'.
52-
5348
5449
5550
## Issues collecting Syslog
@@ -80,13 +75,12 @@ For more information on how to troubleshoot syslog issues with Azure Monitor Age
8075
2. The parsed configuration is stored at `/etc/opt/microsoft/azuremonitoragent/config-cache/configchunks/`. Check that Syslog collection is defined and the log destinations are the same as constructed in DCR UI / DCR JSON.
8176
1. If yes, proceed to step 3. If not, the issue is in the configuration workflow.
8277
2. Investigate `mdsd.err`,`mdsd.warn`, `mdsd.info` files under `/var/opt/microsoft/azuremonitoragent/log` for possible configuration errors.
83-
3. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'Syslog DCR not available' and **Problem type** as 'I need help configuring data collection from a VM'.
78+
8479
3. Validate the layout of the Syslog collection workflow to ensure all necessary pieces are in place and accessible:
8580
1. For `rsyslog` users, ensure the `/etc/rsyslog.d/10-azuremonitoragent.conf` file is present, isn't empty, and is accessible by the `rsyslog` daemon (syslog user).
8681
1. Check your rsyslog configuration at `/etc/rsyslog.conf` and `/etc/rsyslog.d/*` to see if you have any inputs bound to a non-default ruleset, as messages from these inputs won't be forwarded to Azure Monitor Agent. For instance, messages from an input configured with a non-default ruleset like `input(type="imtcp" port="514" `**`ruleset="myruleset"`**`)` won't be forward.
8782
2. For `syslog-ng` users, ensure the `/etc/syslog-ng/conf.d/azuremonitoragent.conf` file is present, isn't empty, and is accessible by the `syslog-ng` daemon (syslog user).
8883
3. Ensure the file `/run/azuremonitoragent/default_syslog.socket` exists and is accessible by `rsyslog` or `syslog-ng` respectively.
89-
4. Check for a corresponding drop in count of processed syslog events in `/var/opt/microsoft/azuremonitoragent/log/mdsd.qos`. If such drop isn't indicated in the file, [file a ticket](#file-a-ticket) with **Summary** as 'Syslog data dropped in pipeline' and **Problem type** as 'I need help with Azure Monitor Linux Agent'.
9084
5. Check that syslog daemon queue isn't overflowing, causing the upload to fail, by referring the guidance here: [Rsyslog data not uploaded due to Full Disk space issue on AMA Linux Agent](./azure-monitor-agent-troubleshoot-linux-vm-rsyslog.md)
9185
4. To debug syslog events ingestion further, you can append trace flag **-T 0x2002** at the end of **MDSD_OPTIONS** in the file `/etc/default/azuremonitoragent`, and restart the agent:
9286
```
@@ -95,9 +89,6 @@ For more information on how to troubleshoot syslog issues with Azure Monitor Age
9589
5. After the issue is reproduced with the trace flag on, you'll find more debug information in `/var/opt/microsoft/azuremonitoragent/log/mdsd.info`. Inspect the file for the possible cause of syslog collection issue, such as parsing / processing / configuration / upload errors.
9690
> [!WARNING]
9791
> Ensure to remove trace flag setting **-T 0x2002** after the debugging session, since it generates many trace statements that could fill up the disk more quickly or make visually parsing the log file difficult.
98-
6. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'AMA fails to collect syslog events' and **Problem type** as 'I need help with Azure Monitor Linux Agent'.
9992
10093
## Troubleshooting issues on Arc-enabled server
10194
If after checking basic troubleshooting steps you don't see the Azure Monitor Agent emitting logs or find **'Failed to get MSI token from IMDS endpoint'** errors in `/var/opt/microsoft/azuremonitoragent/log/mdsd.err` log file, it's likely `syslog` user isn't a member of the group `himds`. Add `syslog` user to `himds` user group if the user isn't a member of this group. Create user `syslog` and the group `syslog`, if necessary, and make sure that the user is in that group. For more information check out Azure Arc-enabled server authentication requirements [here](../../azure-arc/servers/managed-identity-authentication.md).
102-
103-
[!INCLUDE [azure-monitor-agent-file-a-ticket](../../../includes/azure-monitor-agent/azure-monitor-agent-file-a-ticket.md)]

articles/azure-monitor/agents/azure-monitor-agent-troubleshoot-windows-arc.md

Lines changed: 2 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -32,10 +32,8 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
3232
GC Service (gcarcservice) : running
3333
Extension Service (extensionservice) : running
3434
```
35-
If instead you see `Agent Status: Disconnected` or any other status, [file a ticket](#file-a-ticket) with **Summary** as 'Arc agent or extensions service not working' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
3635
3. Wait for 10-15 minutes as extension maybe in transitioning status. If it still doesn't show up, [uninstall and install the extension](./azure-monitor-agent-manage.md) again and repeat the verification to see the extension show up.
3736
4. If not, check if you see any errors in extension logs located at `C:\ProgramData\GuestConfig\extension_logs\Microsoft.Azure.Monitor.AzureMonitorWindowsAgent` on your machine
38-
5. If none of the above works, [file a ticket](#file-a-ticket) with **Summary** as 'AMA extension fails to install or provision' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
3937
4038
3. **Verify that the agent is running**:
4139
1. Check if the agent is emitting heartbeat logs to Log Analytics workspace using the query below. Skip if 'Custom Metrics' is the only destination in the DCR:
@@ -44,22 +42,19 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
4442
```
4543
2. If not, open Task Manager and check if 'MonAgentCore.exe' process is running. If it is, wait for 5 minutes for heartbeat to show up.
4644
3. If not, check if you see any errors in core agent logs located at `C:\Resources\Directory\AMADataStore\Configuration` on your machine
47-
4. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'AMA extension provisioned but not running' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
4845
4946
4. **Verify that the DCR exists and is associated with the Arc-enabled server:**
5047
1. If using Log Analytics workspace as destination, verify that DCR exists in the same physical region as the Log Analytics workspace.
5148
2. On your Arc-enabled server, verify the existence of the file `C:\Resources\Directory\AMADataStore\mcs\mcsconfig.latest.xml`. If this file doesn't exist, the Arc-enabled server may not be associated with a DCR.
5249
3. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** from the pane on the left > You should see the Arc-enabled server listed here
5350
4. If not listed, click 'Add' and select your Arc-enabled server from the resource picker. Repeat across all DCRs.
54-
5. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'DCR not found or associated' and **Problem type** as 'I need help configuring data collection from a VM'.
5551
5652
5. **Verify that agent was able to download the associated DCR(s) from AMCS service:**
5753
1. Check if you see the latest DCR downloaded at this location `C:\Resources\Directory\AMADataStore\mcs\configchunks`
58-
2. If not, [file a ticket](#file-a-ticket) with **Summary** as 'AMA unable to download DCR config' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
5954
6055
## Issues collecting Performance counters
6156
1. Check that your DCR JSON contains a section for 'performanceCounters'. If not, fix your DCR. See [how to create DCR](./azure-monitor-agent-data-collection.md) or [sample DCR](./data-collection-rule-sample-agent.md).
62-
2. Check that the file `C:\Resources\Directory\AMADataStore\mcs\mcsconfig.lkg.xml` exists. If it doesn't exist, [file a ticket](#file-a-ticket) with **Summary** as 'AMA didn't run long enough to mark and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
57+
2. Check that the file `C:\Resources\Directory\AMADataStore\mcs\mcsconfig.lkg.xml` exists.
6358
3. Open the file and check if it contains `CounterSet` nodes as shown in the example below:
6459
```xml
6560
<CounterSet storeType="Local" duration="PT1M"
@@ -71,8 +66,6 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
7166
<Counter>\PhysicalDisk(_Total)\Avg. Disk Queue Length</Counter>
7267
</CounterSet>
7368
```
74-
If there are no `CounterSet` nodes, then the DCR wasn't parsed correctly. [File a ticket](#file-a-ticket) with **Summary** as 'AMA unable to parse DCR config' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
75-
7669
7770
7871
### Issues using 'Custom Metrics' as destination
@@ -97,11 +90,10 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
9790
6. Collect logs by running the command `C:\Packages\Plugins\Microsoft.Azure.Monitor.AzureMonitorWindowsAgent\<version-number>\Monitoring\Agent\table2csv.exe C:\Resources\Directory\AMADataStore\Tables\MaMetricsExtensionEtw.tsf`
9891
1. The command will generate the file 'MaMetricsExtensionEtw.csv'
9992
2. Open it and look for any Level 2 errors and try to fix them.
100-
7. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'AMA unable to collect custom metrics' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
10193
10294
## Issues collecting Windows event logs
10395
1. Check that your DCR JSON contains a section for 'windowsEventLogs'. If not, fix your DCR. See [how to create DCR](./azure-monitor-agent-data-collection.md) or [sample DCR](./data-collection-rule-sample-agent.md).
104-
2. Check that the file `C:\Resources\Directory\AMADataStore\mcs\mcsconfig.lkg.xml` exists. If it doesn't exist, [file a ticket](#file-a-ticket) with **Summary** as 'AMA didn't run long enough to mark and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
96+
2. Check that the file `C:\Resources\Directory\AMADataStore\mcs\mcsconfig.lkg.xml` exists.
10597
3. Open the file and check if it contains `Subscription` nodes as shown in the example below:
10698
```xml
10799
<Subscription eventName="c9302257006473204344_14882095577508259570"
@@ -114,6 +106,3 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
114106
</Column>
115107
</Subscription>
116108
```
117-
If there are no `Subscription` nodes, then the DCR wasn't parsed correctly. [File a ticket](#file-a-ticket) with **Summary** as 'AMA unable to parse DCR config' and **Problem type** as 'I need help with Azure Monitor Windows Agent'.
118-
119-
[!INCLUDE [azure-monitor-agent-file-a-ticket](../../../includes/azure-monitor-agent/azure-monitor-agent-file-a-ticket.md)]

0 commit comments

Comments
 (0)