You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -164,6 +164,8 @@ This access token is a v1.0-formatted token for Microsoft Graph. This is because
164
164
165
165
An error response is returned by the token endpoint when trying to acquire an access token for the downstream API, if the downstream API has a Conditional Access policy (such as [multifactor authentication](../authentication/concept-mfa-howitworks.md)) set on it. The middle-tier service should surface this error to the client application so that the client application can provide the user interaction to satisfy the Conditional Access policy.
166
166
167
+
To [surface this error back](https://datatracker.ietf.org/doc/html/rfc6750#section-3.1) to the client, the middle-tier service will reply with HTTP 401 Unauthorized and with a WWW-Authenticate HTTP header containing the error and the claim challenge. The client must parse this header and acquire a new token from the token issuer, by presenting the claims challenge if one exists. Clients should not retry to access the middle-tier service using a cached access token.
Copy file name to clipboardExpand all lines: articles/api-management/trace-policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,8 +14,8 @@ ms.author: danlep
14
14
The `trace` policy adds a custom trace into the request tracing output in the test console, Application Insights telemetries, and/or resource logs.
15
15
16
16
- The policy adds a custom trace to the [request tracing](./api-management-howto-api-inspector.md) output in the test console when tracing is triggered, that is, `Ocp-Apim-Trace` request header is present and set to `true` and `Ocp-Apim-Subscription-Key` request header is present and holds a valid key that allows tracing.
17
-
- The policy creates a [Trace](../azure-monitor/app/data-model-complete.md#trace) telemetry in Application Insights, when [Application Insights integration](./api-management-howto-app-insights.md) is enabled and the `severity` specified in the policy is equal to or greater than the `verbosity` specified in the diagnostic setting.
18
-
- The policy adds a property in the log entry when [resource logs](./api-management-howto-use-azure-monitor.md#resource-logs) are enabled and the severity level specified in the policy is at or higher than the verbosity level specified in the diagnostic setting.
17
+
- The policy creates a [Trace](../azure-monitor/app/data-model-complete.md#trace) telemetry in Application Insights, when [Application Insights integration](./api-management-howto-app-insights.md) is enabled and the `severity` specified in the policy is equal to or greater than the `verbosity` specified in the [diagnostic setting](./diagnostic-logs-reference.md).
18
+
- The policy adds a property in the log entry when [resource logs](./api-management-howto-use-azure-monitor.md#resource-logs) are enabled and the severity level specified in the policy is at or higher than the verbosity level specified in the [diagnostic setting](./diagnostic-logs-reference.md).
19
19
- The policy is not affected by Application Insights sampling. All invocations of the policy will be logged.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/concept-geo-replication.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,12 @@ To add once these links become available:
44
44
45
45
Each replica created will add extra charges. Reference the [App Configuration pricing page](https://azure.microsoft.com/pricing/details/app-configuration/) for details. As an example, if your origin is a standard tier configuration store and you have five replicas, you would be charged the rate of six standard tier configuration stores for your system, but each of your replica's isolated quota and requests are included in this charge.
46
46
47
+
## Monitoring
48
+
49
+
To offer insights into the characteristics of the geo-replication feature, App Configuration provides a metric named **Replication Latency**. The replication latency metric describes how long it takes for data to replicate from one region to another.
50
+
51
+
For more information on the replication latency metric and other App Configuration metrics see [Monitoring App Configuration data reference](./monitor-app-configuration-reference.md).
| Http Incoming Request Duration | Milliseconds | Server side duration of an Http Request |
25
25
| Throttled Http Request Count | Count | Throttled requests are Http requests that receive a response with a status code of 429 |
26
26
| Daily Storage Usage | Percent | Represents the amount of storage in use as a percentage of the maximum allowance. This metric is updated at least once daily. |
27
+
| Replication Latency | Milliseconds | Represents the average time it takes for a replica to be consistent with current state. |
27
28
28
29
For more information, see a list of [all platform metrics supported in Azure Monitor](../azure-monitor/essentials/metrics-supported.md).
29
30
@@ -37,6 +38,7 @@ App Configuration has the following dimensions associated with its metr
37
38
| Http Incoming Request Duration | The supported dimensions are the **HttpStatusCode**, **AuthenticationScheme**, and **Endpoint** of each request. **AuthenticationScheme** can be filtered by AAD or HMAC authentication. |
38
39
| Throttled Http Request Count | The **Endpoint** of each request is included as a dimension. |
39
40
| Daily Storage Usage | This metric does not have any dimensions. |
41
+
| Replication Latency | The **Endpoint** of the replica that data was replicated to is included as a dimension. |
40
42
41
43
For more information on what metric dimensions are, see [Multi-dimensional metrics](../azure-monitor/essentials/data-platform-metrics.md#multi-dimensional-metrics).
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/monitor-app-configuration.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,6 +101,7 @@ You can analyze metrics for App Configuration with metrics from other Azure serv
101
101
* Http Incoming Request Duration
102
102
* Throttled Http Request Count (Http status code 429 Responses)
103
103
* Daily Storage Usage
104
+
* Replication Latency
104
105
105
106
In the portal, navigate to the **Metrics** section and select the **Metric Namespaces** and **Metrics** you want to analyze. This screenshot shows you the metrics view when selecting **Http Incoming Request Count** for your configuration store.
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/azure-monitor-agent-manage.md
+14-1Lines changed: 14 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,7 +73,7 @@ For information on how to install Azure Monitor Agent from the Azure portal, see
73
73
74
74
#### [PowerShell](#tab/azure-powershell)
75
75
76
-
You can install Azure Monitor Agent on Azure virtual machines and on Azure Arc-enabled servers by using the PowerShell command for adding a virtual machine extension.
76
+
You can install Azure Monitor Agent on Azure virtual machines and on Azure Arc-enabled servers by using the PowerShell command for adding a virtual machine extension.
77
77
78
78
### Install on Azure virtual machines
79
79
@@ -103,6 +103,10 @@ Use the following PowerShell commands to install Azure Monitor Agent on Azure vi
Use the [Add-AzVmssExtension](/powershell/module/az.compute/add-azvmssextension) PowerShell cmdlet to install Azure Monitor Agent on Azure virtual machines scale sets.
109
+
106
110
### Install on Azure Arc-enabled servers
107
111
108
112
Use the following PowerShell commands to install Azure Monitor Agent on Azure Arc-enabled servers.
@@ -148,6 +152,9 @@ Use the following CLI commands to install Azure Monitor Agent on Azure virtual m
148
152
```azurecli
149
153
az vm extension set --name AzureMonitorLinuxAgent --publisher Microsoft.Azure.Monitor --ids <vm-resource-id> --enable-auto-upgrade true
150
154
```
155
+
### Install on Azure virtual machines scale set
156
+
157
+
Use the [az vmss extension set](/cli/azure/vmss/extension) CLI cmdlet to install Azure Monitor Agent on Azure virtual machines scale sets.
151
158
152
159
### Install on Azure Arc-enabled servers
153
160
@@ -207,6 +214,9 @@ Use the following PowerShell commands to uninstall Azure Monitor Agent on Azure
Use the [Remove-AzVmssExtension](/powershell/module/az.compute/remove-azvmssextension) PowerShell cmdlet to uninstall Azure Monitor Agent on Azure virtual machines scale sets.
210
220
211
221
### Uninstall on Azure Arc-enabled servers
212
222
@@ -237,6 +247,9 @@ Use the following CLI commands to uninstall Azure Monitor Agent on Azure virtual
237
247
```azurecli
238
248
az vm extension delete --resource-group <resource-group-name> --vm-name <virtual-machine-name> --name AzureMonitorLinuxAgent
239
249
```
250
+
### Uninstall on Azure virtual machines scale set
251
+
252
+
Use the [az vmss extension delete](/cli/azure/vmss/extension) CLI cmdlet to uninstall Azure Monitor Agent on Azure virtual machines scale sets.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/java-standalone-profiler.md
+30-5Lines changed: 30 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ The Application Insights Java Profiler provides a system for:
22
22
23
23
The Application Insights Java profiler uses the JFR profiler provided by the JVM to record profiling data, allowing users to download the JFR recordings at a later time and analyze them to identify the cause of performance issues.
24
24
25
-
This data is gathered on demand when trigger conditions are met. The available triggers are thresholds over CPU usage and Memory consumption.
25
+
This data is gathered on demand when trigger conditions are met. The available triggers are thresholds over CPU usage, Memory consumption, and Request (SLA triggers). Request triggers monitor Spans generated by Open Telemetry and allow the user to configure SLA requirements over the duration of those Spans.
26
26
27
27
When a threshold is reached, a profile of the configured type and duration is gathered and uploaded. This profile is then visible within the performance pane of the associated Application Insights Portal UI.
28
28
@@ -56,7 +56,7 @@ See [Configuring Profile Contents](#configuring-profile-contents) on setting a c
56
56
57
57
For more detailed description of the various triggers available, see [profiler overview](../profiler/profiler-overview.md).
58
58
59
-
The ApplicationInsights Java Agent monitors CPUand memory consumption and if it breaches a configured threshold a profile is triggered. Both thresholds are a percentage.
59
+
The ApplicationInsights Java Agent monitors CPU, memory, and request duration such as a business transaction. If it breaches a configured threshold, a profile is triggered.
60
60
61
61
#### Profile now
62
62
@@ -89,6 +89,24 @@ In this scenario, a profile will occur in the following circumstances:
89
89
- Full garbage collection is executed
90
90
- The Tenured regions occupancy is above 691 mb after collection
91
91
92
+
### Request
93
+
94
+
SLA triggers are based on OpenTelemetry (otel) and they will initiate a profile if certain criteria is fulfilled.
95
+
96
+
Each individual trigger configuration is formed as follows:
97
+
98
+
-`Name` - A unique identifier for the trigger.
99
+
-`Filter` - Filters the requests of interest for the trigger.
100
+
-`Aggregation` - This calculates the ratio of requests that breached a given threshold.
101
+
-`Threshold` - A value (in milliseconds) above which a request breach is determined.
102
+
-`Minimum samples` - The minimum number of samples that must be collected for the aggregation to produce data, this is to prevent triggering off of small sample sizes.
103
+
-`Window` - Rolling time window (in milliseconds).
104
+
-`Threshold` - The threshold value (percentage) applied to the aggregation output. If this value is exceeded, a profile is initiated.
105
+
106
+
For instance, the following scenario would trigger a profile if: more than 75% of requests to a specific endpoint (/users/.*) take longer than 30 ms within a 60 seconds window, when at least 100 samples were gathered.
107
+
108
+
:::image type="content" source="./media/java-standalone-profiler/request-trigger-sample.png" alt-text="Screenshot of request trigger sample":::
109
+
92
110
### Installation
93
111
94
112
The following steps will guide you through enabling the profiling component on the agent and configuring resource limits that will trigger a profile if breached.
@@ -101,8 +119,8 @@ The following steps will guide you through enabling the profiling component on t
101
119
102
120
2. Select "Triggers"
103
121
104
-
3. Configure the required CPU and Memory thresholds and select Apply.
105
-
:::image type="content" source="./media/java-standalone-profiler/cpu-memory-trigger-settings.png" alt-text="Screenshot of trigger settings pane for CPU and Memory triggers.":::
122
+
3. Configure the required CPU, Memory or Request triggers (if enabled) and select Apply.
123
+
:::image type="content" source="./media/java-standalone-profiler/trigger-settings.png" alt-text="Screenshot of trigger settings":::
106
124
107
125
> [!WARNING]
108
126
> The Java profiler does not support the "Sampling" trigger. Configuring this will have no effect.
Copy file name to clipboardExpand all lines: articles/backup/azure-kubernetes-service-cluster-backup-concept.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ To enable backup for an AKS cluster, see the following prerequisites: .
64
64
65
65
- Before installing Backup Extension in the AKS cluster, ensure that the CSI drivers and snapshots are enabled for your cluster. If disabled, see [these steps to enable them](../aks/csi-storage-drivers.md#enable-csi-storage-drivers-on-an-existing-cluster).
66
66
67
-
- Backup Extension uses the AKS cluster’s Managed System Identity to perform backup operations. So, ASK backup doesn't support AKS clusters using Service Principal. You can [update your AKS cluster to use Managed System Identity](../aks/use-managed-identity.md#enable-managed-identities-on-an-existing-aks-cluster).
67
+
- Backup Extension uses the AKS cluster’s Managed System Identity to perform backup operations. So, AKS backup doesn't support AKS clusters using Service Principal. You can [update your AKS cluster to use Managed System Identity](../aks/use-managed-identity.md#enable-managed-identities-on-an-existing-aks-cluster).
68
68
69
69
>[!Note]
70
70
>Only Managed System Identity based AKS clusters are supported by AKS backup. The support for User Identity based AKS clusters is currently not available.
0 commit comments