Skip to content

Commit 216b032

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sasBk
2 parents c74d4dc + 30a1f46 commit 216b032

File tree

48 files changed

+1632
-1644
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+1632
-1644
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-monitor/snapshot-debugger/snapshot-debugger-upgrade.md",
5+
"redirect_url": "/azure/azure-monitor/snapshot-debugger/snapshot-debugger#upgrading-snapshot-debugger",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/azure-monitor/snapshot-debugger/snapshot-collector-release-notes.md",
510
"redirect_url": "/azure/azure-monitor/snapshot-debugger/snapshot-debugger#release-notes-for-microsoftapplicationinsightssnapshotcollector",
@@ -6881,12 +6886,12 @@
68816886
},
68826887
{
68836888
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-private-link.md",
6884-
"redirect_url": "/previous-versions/azure/azure-monitor/containers/kubernetes-monitoring-private-link",
6889+
"redirect_url": "/azure/azure-monitor/containers/kubernetes-monitoring-private-link",
68856890
"redirect_document_id": false
68866891
},
68876892
{
68886893
"source_path_from_root": "/articles/azure-monitor/essentials/private-link-data-ingestion.md",
6889-
"redirect_url": "/previous-versions/azure/azure-monitor/containers/kubernetes-monitoring-private-link",
6894+
"redirect_url": "/azure/azure-monitor/containers/kubernetes-monitoring-private-link",
68906895
"redirect_document_id": false
68916896
}
68926897
]
-75 Bytes
Loading

articles/azure-functions/functions-dotnet-class-library.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,6 @@ Azure Functions supports C# and C# script programming languages. If you're looki
3131

3232
### Updating to target .NET 8
3333

34-
> [!NOTE]
35-
> Targeting .NET 8 with the in-process model is not yet enabled for apps in sovereign clouds. Updates will be communicated on [this tracking thread on GitHub](https://github.com/Azure/azure-functions-host/issues/9951).
36-
3734
Apps using the in-process model can target .NET 8 by following the steps outlined in this section. However, if you choose to exercise this option, you should still begin planning your [migration to the isolated worker model](./migrate-dotnet-to-isolated-model.md) in advance of [support ending for the in-process model on November 10, 2026](https://aka.ms/azure-functions-retirements/in-process-model).
3835

3936
Many apps can change the configuration of the function app in Azure without updates to code or redeployment. To run .NET 8 with the in-process model, three configurations are required:

articles/azure-government/documentation-government-overview-dod.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-government
77
ms.topic: article
88
ms.custom: references_regions
99
recommendations: false
10-
ms.date: 05/09/2023
10+
ms.date: 08/15/2024
1111
---
1212

1313
# Department of Defense (DoD) in Azure Government
@@ -92,7 +92,7 @@ The following services are in scope for DoD IL5 PA in US DoD regions (US DoD Cen
9292
- [Microsoft Stream](/stream/overview)
9393
- [Network Watcher](https://azure.microsoft.com/services/network-watcher/)
9494
- [Power Apps](/powerapps/powerapps-overview)
95-
- [Power Apps portal](https://powerapps.microsoft.com/portals/)
95+
- [Power Pages](https://powerapps.microsoft.com/portals/)
9696
- [Power Automate](/power-automate/getting-started) (formerly Microsoft Flow)
9797
- [Power BI](https://powerbi.microsoft.com/)
9898
- [Power BI Embedded](https://azure.microsoft.com/services/power-bi-embedded/)
Lines changed: 73 additions & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Enable Snapshot Debugger for .NET apps in Azure App Service | Microsoft Docs
33
description: Enable Snapshot Debugger for .NET apps in Azure App Service
4-
ms.topic: conceptual
4+
ms.topic: how-to
55
ms.author: hannahhunter
66
author: hhunter-ms
77
ms.reviewer: charles.weininger
@@ -12,98 +12,51 @@ ms.custom: devdivchpfy22, devx-track-arm-template, devx-track-dotnet
1212

1313
# Enable Snapshot Debugger for .NET apps in Azure App Service
1414

15-
Snapshot Debugger currently supports ASP.NET and ASP.NET Core apps that are running on Azure App Service on Windows service plans.
16-
1715
> [!NOTE]
18-
> We recommend that you run your application on the Basic service tier, or higher, when using Snapshot Debugger. For most applications, the Free and Shared service tiers don't have enough memory or disk space to save snapshots. The Consumption tier is not currently available for Snapshot Debugger.
16+
> If you're using a preview version of .NET Core, or your application references Application Insights SDK (directly or indirectly via a dependent assembly), follow the instructions for [Enable Snapshot Debugger for other environments](snapshot-debugger-vm.md) to include the [`Microsoft.ApplicationInsights.SnapshotCollector`](https://www.nuget.org/packages/Microsoft.ApplicationInsights.SnapshotCollector) NuGet package with the application.
1917
20-
## <a id="installation"></a> Enable Snapshot Debugger
18+
Snapshot Debugger currently supports ASP.NET and ASP.NET Core apps running on Azure App Service on Windows service plans.
2119

22-
Snapshot Debugger is pre-installed as part of the App Services runtime, but you need to turn it on to get snapshots for your App Service app. To enable Snapshot Debugger for an app, follow the instructions below:
20+
We recommend that you run your application on the Basic or higher service tiers when using Snapshot Debugger. For most applications:
21+
- The Free and Shared service tiers don't have enough memory or disk space to save snapshots.
22+
- The Consumption tier isn't currently available for Snapshot Debugger.
2323

24-
> [!NOTE]
25-
> If you're using a preview version of .NET Core, or your application references Application Insights SDK (directly or indirectly via a dependent assembly), follow the instructions for [Enable Snapshot Debugger for other environments](snapshot-debugger-vm.md) to include the [`Microsoft.ApplicationInsights.SnapshotCollector`](https://www.nuget.org/packages/Microsoft.ApplicationInsights.SnapshotCollector) NuGet package with the application.
24+
Although Snapshot Debugger is preinstalled as part of the App Services runtime, you need to turn it on to get snapshots for your App Service app. Codeless installation of Snapshot Debugger follows [the .NET Core support policy.](https://dotnet.microsoft.com/platform/support/policy/dotnet-core).
2625

27-
> [!NOTE]
28-
> Codeless installation of Application Insights Snapshot Debugger follows the .NET Core support policy.
29-
> For more information about supported runtimes, see [.NET Core Support Policy](https://dotnet.microsoft.com/platform/support/policy/dotnet-core).
26+
# [Azure portal](#tab/portal)
3027

31-
After you've deployed your .NET app:
28+
After you've deployed your .NET App Services web app:
3229

33-
1. Go to the Azure control panel for your App Service.
34-
1. Go to the **Settings** > **Application Insights** page.
30+
1. Navigate to your App Service in the Azure portal.
31+
1. In the left-side menu, select **Settings** > **Application Insights**.
3532

3633
:::image type="content" source="./media/snapshot-debugger/application-insights-app-services.png" alt-text="Screenshot showing the Enable App Insights on App Services portal.":::
3734

38-
1. Either follow the instructions on the page to create a new resource or select an existing App Insights resource to monitor your app.
39-
1. Switch Snapshot Debugger toggles to **On**.
35+
1. Click **Turn on Application Insights**.
36+
- If you have an existing Application Insights resource you'd rather use, select that option under **Change your resource**.
37+
1. Under **Instrument your application**, select the **.NET** tab.
38+
1. Switch both Snapshot Debugger toggles to **On**.
4039

4140
:::image type="content" source="./media/snapshot-debugger/enablement-ui.png" alt-text="Screenshot showing how to add App Insights site extension.":::
4241

43-
1. Snapshot Debugger is now enabled using an App Services App Setting.
42+
1. Snapshot Debugger is now enabled.
4443

4544
:::image type="content" source="./media/snapshot-debugger/snapshot-debugger-app-setting.png" alt-text="Screenshot showing App Setting for Snapshot Debugger.":::
4645

47-
If you're running a different type of Azure service, here are instructions for enabling Snapshot Debugger on other supported platforms:
48-
49-
* [Azure Function](snapshot-debugger-function-app.md?toc=/azure/azure-monitor/toc.json)
50-
* [Azure Cloud Services](snapshot-debugger-vm.md?toc=/azure/azure-monitor/toc.json)
51-
* [Azure Service Fabric services](snapshot-debugger-vm.md?toc=/azure/azure-monitor/toc.json)
52-
* [Azure Virtual Machines and Virtual Machine Scale Sets](snapshot-debugger-vm.md?toc=/azure/azure-monitor/toc.json)
53-
* [On-premises virtual or physical machines](snapshot-debugger-vm.md?toc=/azure/azure-monitor/toc.json)
54-
55-
## Enable Snapshot Debugger for other clouds
56-
57-
Currently the only regions that require endpoint modifications are [Azure Government](../../azure-government/compare-azure-government-global-azure.md#application-insights) and [Microsoft Azure operated by 21Vianet](/azure/china/resources-developer-guide) through the Application Insights Connection String.
58-
59-
|Connection String Property | US Government Cloud | China Cloud |
60-
|---------------|---------------------|-------------|
61-
|SnapshotEndpoint | `https://snapshot.monitor.azure.us` | `https://snapshot.monitor.azure.cn` |
62-
63-
For more information about other connection overrides, see [Application Insights documentation](../app/sdk-connection-string.md?tabs=net#connection-string-with-explicit-endpoint-overrides).
64-
65-
<a name='enable-azure-active-directory-authentication-for-snapshot-ingestion'></a>
66-
67-
## Enable Microsoft Entra authentication for snapshot ingestion
68-
69-
Application Insights Snapshot Debugger supports Microsoft Entra authentication for snapshot ingestion. This means, for all snapshots of your application to be ingested, your application must be authenticated and provide the required application settings to the Snapshot Debugger agent.
70-
71-
As of today, Snapshot Debugger only supports Microsoft Entra authentication when you reference and configure Microsoft Entra ID using the Application Insights SDK in your application.
72-
73-
To turn-on Microsoft Entra ID for snapshot ingestion:
74-
75-
1. Create and add the managed identity you want to use to authenticate against your Application Insights resource to your App Service.
76-
77-
1. For System-Assigned Managed identity, see the following [documentation](../../app-service/overview-managed-identity.md?tabs=portal%2chttp#add-a-system-assigned-identity).
78-
79-
1. For User-Assigned Managed identity, see the following [documentation](../../app-service/overview-managed-identity.md?tabs=portal%2chttp#add-a-user-assigned-identity).
80-
81-
1. Configure and turn on Microsoft Entra ID in your Application Insights resource. For more information, see the following [documentation](../app/azure-ad-authentication.md?tabs=net#configure-and-enable-azure-ad-based-authentication)
82-
1. Add the following application setting, used to let Snapshot Debugger agent know which managed identity to use:
83-
84-
For System-Assigned Identity:
85-
86-
|App Setting | Value |
87-
|---------------|----------|
88-
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AD |
89-
90-
For User-Assigned Identity:
91-
92-
|App Setting | Value |
93-
|---------------|----------|
94-
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AD;ClientID={Client ID of the User-Assigned Identity} |
95-
9646
## Disable Snapshot Debugger
9747

98-
To disable Snapshot Debugger, repeat the [steps for enabling](#installation). However, switch the Snapshot Debugger toggles to **Off**.
48+
To disable Snapshot Debugger for your App Services resource:
49+
1. Navigate to your App Service in the Azure portal.
50+
1. In the left-side menu, select **Settings** > **Application Insights**.
51+
1. Switch the Snapshot Debugger toggles to **Off**.
9952

100-
## Azure Resource Manager template
53+
# [Azure Resource Manager](#tab/arm)
10154

102-
For an Azure App Service, you can set app settings within the Azure Resource Manager template to enable Snapshot Debugger and Profiler. For example:
55+
You can also set app settings within the Azure Resource Manager template to enable Snapshot Debugger and Profiler. For example:
10356

10457
```json
10558
{
106-
"apiVersion": "2015-08-01",
59+
"apiVersion": "2023-12-01",
10760
"name": "[parameters('webSiteName')]",
10861
"type": "Microsoft.Web/sites",
10962
"location": "[resourceGroup().location]",
@@ -129,7 +82,7 @@ For an Azure App Service, you can set app settings within the Azure Resource Man
12982
],
13083
"properties": {
13184
"APPINSIGHTS_INSTRUMENTATIONKEY": "[reference(resourceId('Microsoft.Insights/components', concat('AppInsights', parameters('webSiteName'))), '2014-04-01').InstrumentationKey]",
132-
"APPINSIGHTS_PROFILERFEATURE_VERSION": "1.0.0",
85+
// "Turn on" a Snapshot Debugger version
13386
"APPINSIGHTS_SNAPSHOTFEATURE_VERSION": "1.0.0",
13487
"DiagnosticServices_EXTENSION_VERSION": "~3",
13588
"ApplicationInsightsAgent_EXTENSION_VERSION": "~2"
@@ -139,19 +92,63 @@ For an Azure App Service, you can set app settings within the Azure Resource Man
13992
},
14093
```
14194

142-
## Not Supported Scenarios
95+
---
96+
97+
Generate traffic to your application that can trigger an exception. Then, wait 10 to 15 minutes for snapshots to be sent to the Application Insights instance.
98+
99+
## Enable Snapshot Debugger for other cloud regions
100+
101+
Currently the only regions that require endpoint modifications are [Azure Government](../../azure-government/compare-azure-government-global-azure.md#application-insights) and [Microsoft Azure operated by 21Vianet](/azure/china/resources-developer-guide) through the Application Insights Connection String.
102+
103+
|Connection String Property | US Government Cloud | China Cloud |
104+
|---------------|---------------------|-------------|
105+
|SnapshotEndpoint | `https://snapshot.monitor.azure.us` | `https://snapshot.monitor.azure.cn` |
106+
107+
For more information about other connection overrides, see [Application Insights documentation](../app/sdk-connection-string.md?tabs=net#connection-string-with-explicit-endpoint-overrides).
108+
109+
## Configure Snapshot Debugger
110+
111+
### Enable Microsoft Entra authentication for snapshot ingestion
112+
113+
Snapshot Debugger supports Microsoft Entra authentication for snapshot ingestion. For all snapshots of your application to be ingested, your application must be authenticated and provide the required application settings to the Snapshot Debugger agent.
114+
115+
As of today, Snapshot Debugger only supports Microsoft Entra authentication when you reference and configure Microsoft Entra ID using the Application Insights SDK in your application.
116+
117+
To turn on Microsoft Entra ID for snapshot ingestion in your App Services resource:
118+
119+
1. Add the managed identity that authenticates against your Application Insights resource to your App Service. You can create either:
120+
121+
- [Add a System-Assigned Managed identity](../../app-service/overview-managed-identity.md?tabs=portal%2chttp#add-a-system-assigned-identity).
122+
- [Add a User-Assigned Managed identity](../../app-service/overview-managed-identity.md?tabs=portal%2chttp#add-a-user-assigned-identity).
123+
124+
1. Configure and turn on Microsoft Entra ID in your Application Insights resource. For more information, see the following [documentation](../app/azure-ad-authentication.md?tabs=net#configure-and-enable-azure-ad-based-authentication)
125+
126+
1. Add the following application setting. This setting tells the Snapshot Debugger agent which managed identity to use:
127+
128+
For System-Assigned Identity:
129+
130+
|App Setting | Value |
131+
|---------------|----------|
132+
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AD |
133+
134+
For User-Assigned Identity:
135+
136+
|App Setting | Value |
137+
|---------------|----------|
138+
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AD;ClientID={Client ID of the User-Assigned Identity} |
139+
140+
## Unsupported scenarios
143141

144142
Below you can find scenarios where Snapshot Collector isn't supported:
145143

146144
|Scenario | Side Effects | Recommendation |
147145
|------------|--------------|----------------|
148-
|You're using the Snapshot Collector SDK in your application directly (*.csproj*) and have enabled the advanced option "Interop".| The local Application Insights SDK (including Snapshot Collector telemetry) will be lost and no Snapshots will be available. <br/> Your application could crash at startup with `System.ArgumentException: telemetryProcessorTypedoes not implement ITelemetryProcessor.` <br/> [Learn more about the Application Insights feature "Interop".](../app/azure-web-apps-net-core.md#troubleshooting) | If you're using the advanced option "Interop", use the codeless Snapshot Collector injection (enabled through the Azure portal). |
146+
|You're using the Snapshot Collector SDK in your application directly (*.csproj*) and enabled the advanced option "Interop".| The local Application Insights SDK (including Snapshot Collector telemetry) are lost and no Snapshots are available. <br/> Your application could crash at startup with `System.ArgumentException: telemetryProcessorTypedoes not implement ITelemetryProcessor.` <br/> [Learn more about the Application Insights feature "Interop".](../app/azure-web-apps-net-core.md#troubleshooting) | If you're using the advanced option "Interop", use the codeless Snapshot Collector injection (enabled through the Azure portal). |
149147

150148
## Next steps
151149

152-
* Generate traffic to your application that can trigger an exception. Then, wait 10 to 15 minutes for snapshots to be sent to the Application Insights instance.
153-
* See [snapshots](snapshot-debugger-data.md?toc=/azure/azure-monitor/toc.json#view-snapshots-in-the-portal) in the Azure portal.
154-
* For help with troubleshooting Snapshot Debugger issues, see [Snapshot Debugger troubleshooting](snapshot-debugger-troubleshoot.md).
150+
- View [snapshots](snapshot-debugger-data.md?toc=/azure/azure-monitor/toc.json#access-debug-snapshots-in-the-portal) in the Azure portal.
151+
- [Troubleshoot Snapshot Debugger issues](snapshot-debugger-troubleshoot.md).
155152

156153
[Enablement UI]: ./media/snapshot-debugger/enablement-ui.png
157154
[snapshot-debugger-app-setting]:./media/snapshot-debugger/snapshot-debugger-app-setting.png

0 commit comments

Comments
 (0)