You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/faq.md
+13-56Lines changed: 13 additions & 56 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.subservice:
6
6
ms.topic: conceptual
7
7
author: bwren
8
8
ms.author: bwren
9
-
ms.date: 01/23/2020
9
+
ms.date: 03/12/2020
10
10
11
11
---
12
12
@@ -192,7 +192,7 @@ See [Network firewall requirements](platform/log-analytics-agent.md#network-fire
192
192
193
193
## Visualizations
194
194
195
-
### Why can't I can’t see View Designer?
195
+
### Why can't I see View Designer?
196
196
197
197
View Designer is only available for users assigned with Contributor permissions or higher in the Log Analytics workspace.
198
198
@@ -576,7 +576,7 @@ If you receive the error **Missing Subscription registration for Microsoft.Opera
576
576
577
577
### Is there support for RBAC enabled AKS clusters?
578
578
579
-
The Container Monitoring solution doesn’t support RBAC, but it is supported with Azure Monitor for Containers. The solution details page may not show the right information in the blades that show data for these clusters.
579
+
The Container Monitoring solution doesn't support RBAC, but it is supported with Azure Monitor for Containers. The solution details page may not show the right information in the blades that show data for these clusters.
580
580
581
581
### How do I enable log collection for containers in the kube-system namespace through Helm?
582
582
@@ -588,7 +588,7 @@ To learn how to upgrade the agent, see [Agent management](insights/container-ins
588
588
589
589
### How do I enable multi-line logging?
590
590
591
-
Currently Azure Monitor for containers doesn’t support multi-line logging, but there are workarounds available. You can configure all the services to write in JSON format and then Docker/Moby will write them as a single line.
591
+
Currently Azure Monitor for containers doesn't support multi-line logging, but there are workarounds available. You can configure all the services to write in JSON format and then Docker/Moby will write them as a single line.
592
592
593
593
For example, you can wrap your log as a JSON object as shown in the example below for a sample node.js application:
594
594
@@ -604,7 +604,7 @@ console.log(json.stringify({
604
604
This data will look like the following example in Azure Monitor for logs when you query for it:
605
605
606
606
```
607
-
LogEntry : ({“Hello": "This example has multiple lines:","Docker/Moby": "will not break this into multiple lines", "and you will receive":"all of them in log analytics", "as one": "log entry"}
607
+
LogEntry : ({"Hello": "This example has multiple lines:","Docker/Moby": "will not break this into multiple lines", "and you will receive":"all of them in log analytics", "as one": "log entry"}
608
608
609
609
```
610
610
@@ -622,81 +622,38 @@ If after you enable Azure Monitor for containers for an AKS cluster, you delete
622
622
623
623
See the [Network firewall requirements](insights/container-insights-onboard.md#network-firewall-requirements) for the proxy and firewall configuration information required for the containerized agent with Azure, Azure US Government, and Azure China 21Vianet clouds.
624
624
625
-
## Azure Monitor for VMs (preview)
625
+
## Azure Monitor for VMs
626
626
This Microsoft FAQ is a list of commonly asked questions about Azure Monitor for VMs. If you have any additional questions about the solution, go to the [discussion forum](https://feedback.azure.com/forums/34192--general-feedback) and post your questions. When a question is frequently asked, we add it to this article so that it can be found quickly and easily.
627
627
628
628
### Can I onboard to an existing workspace?
629
629
If your virtual machines are already connected to a Log Analytics workspace, you may continue to use that workspace when onboarding to Azure Monitor for VMs, provided it is in one of the supported regions listed [here](insights/vminsights-enable-overview.md#prerequisites).
630
630
631
-
When onboarding, we configure performance counters for the workspace that will cause all of the VMs reporting data to the workspace to begin collecting this information for display and analysis in Azure Monitor for VMs. As a result, you will see performance data from all of the VMs connected to the selected workspace. The Health and Map features are only enabled for the VMs that you have specified to onboard.
632
-
633
-
For more information on which performance counters are enabled, refer to our [enable overview](insights/vminsights-enable-overview.md#performance-counters-enabled) article.
634
631
635
632
### Can I onboard to a new workspace?
636
633
If your VMs are not currently connected to an existing Log Analytics workspace, you need to create a new workspace to store your data. Creating a new default workspace is done automatically if you configure a single Azure VM for Azure Monitor for VMs through the Azure portal.
637
634
638
-
If you choose to use the script-based method, these steps are covered in the [Enable Azure Monitor for VMs (preview) using Azure PowerShell or Resource Manager template](insights/vminsights-enable-at-scale-powershell.md) article.
635
+
If you choose to use the script-based method, these steps are covered in the [Enable Azure Monitor for VMs using Azure PowerShell or Resource Manager template](insights/vminsights-enable-at-scale-powershell.md) article.
639
636
640
637
### What do I do if my VM is already reporting to an existing workspace?
641
-
If you are already collecting data from your virtual machines, you may have already configured it to report data to an existing Log Analytics workspace. As long as that workspace is in one of our supported regions, you can enable Azure Monitor for VMs to that pre-existing workspace. If the workspace you are already using is not in one of our supported regions, you won’t be able to onboard to Azure Monitor for VMs at this time. We are actively working to support additional regions.
638
+
If you are already collecting data from your virtual machines, you may have already configured it to report data to an existing Log Analytics workspace. As long as that workspace is in one of our supported regions, you can enable Azure Monitor for VMs to that pre-existing workspace. If the workspace you are already using is not in one of our supported regions, you won't be able to onboard to Azure Monitor for VMs at this time. We are actively working to support additional regions.
642
639
643
-
>[!NOTE]
644
-
>We configure performance counters for the workspace that affects all VMs that report to the workspace, whether or not you have chosen to onboard them to Azure Monitor for VMs. For more details on how performance counters are configured for the workspace, please refer to our [documentation](platform/data-sources-performance-counters.md). For information about the counters configured for Azure Monitor for VMs, please refer to our [enable Azure Monitor for VMs](insights/vminsights-enable-overview.md#performance-counters-enabled) article.
645
640
646
641
### Why did my VM fail to onboard?
647
642
When onboarding an Azure VM from the Azure portal, the following steps occur:
648
643
649
644
* A default Log Analytics workspace is created, if that option was selected.
650
-
* The performance counters are configured for selected workspace. If this step fails, you notice that some of the performance charts and tables aren't showing data for the VM you onboarded. You can fix this by running the PowerShell script documented [here](insights/vminsights-enable-at-scale-powershell.md#enable-performance-counters).
651
645
* The Log Analytics agent is installed on Azure VMs using a VM extension, if determined it is required.
652
-
* The Azure Monitor for VMs Map Dependency agent is installed on Azure VMs using an extension, if determined it is required.
653
-
* Azure Monitor components supporting the Health feature are configured, if needed, and the VM is configured to report health data.
646
+
* The Azure Monitor for VMs Map Dependency agent is installed on Azure VMs using an extension, if determined it is required.
654
647
655
-
During the onboard process, we check for status on each of the above to return a notification status to you in the portal. Configuration of the workspace and the agent installation typically takes 5 to 10 minutes. Viewing monitoring and health data in the portal take an additional 5 to 10 minutes.
648
+
During the onboard process, we check for status on each of the above to return a notification status to you in the portal. Configuration of the workspace and the agent installation typically takes 5 to 10 minutes. Viewing monitoring data in the portal take an additional 5 to 10 minutes.
656
649
657
650
If you have initiated onboarding and see messages indicating the VM needs to be onboarded, allow for up to 30 minutes for the VM to complete the process.
658
651
659
-
### I only enabled Azure Monitor for VMs, Why do I see all my VMs monitored by the Health feature?
660
-
The Health feature is enabled for all VMs that are connected to the Log Analytics workspace, even when the action is initiated for a single VM.
661
-
662
-
### Can I modify the schedule for when health criteria evaluates a condition?
663
-
No, the time period and frequency of health criteria can't be modified with this release.
664
-
665
-
### Can I disable health criteria for a condition I don't need to monitor?
666
-
Health criteria can't be disabled in this release.
667
-
668
-
### Are the health alert severities configurable?
669
-
Health alert severity cannot be modified, they can only be enabled or disabled. Additionally, some alert severities update based on the state of health criteria.
670
-
671
-
### If I reconfigure the settings of a particular health criteria, can it be scoped to a specific instance?
672
-
If you modify any setting of a health criterion instance, all health criteria instances of the same type on the Azure VM are modified. For example, if the threshold of the disk free-space health criterion instance that corresponds to logical disk C: is modified, this threshold applies to all other logical disks that are discovered and monitored for the same VM.
673
-
674
-
### Does the Health feature monitor logical processors and cores?
675
-
No, individual processor and logical processor level health criteria is not included for a Windows, only Total CPU utilization is monitored by default to effectively evaluate CPU pressure based on the total number of logical CPUs available to the Azure VM.
676
-
677
-
### Are all health criteria thresholds configurable?
678
-
Thresholds for health criteria that target a Windows VM aren’t modifiable, because their health states are set to *running* or *available*. When you query the health state from the [Workload Monitor API](https://docs.microsoft.com/rest/api/monitor/microsoft.workloadmonitor/components), it displays the *comparisonOperator* value of **LessThan** or **GreaterThan** with a *threshold* value of **4** for the service or entity if:
679
-
- DNS Client Service Health – Service isn't running.
680
-
- DHCP client service health – Service isn't running.
681
-
- RPC Service Health – Service isn't running.
682
-
- Windows firewall service health – Service isn't running.
683
-
- Windows event log service health – Service isn't running.
684
-
- Server service health – Service isn't running.
685
-
- Windows remote management service health – Service isn't running.
686
-
- File system error or corruption – Logical Disk is unavailable.
687
-
688
-
Thresholds for the following Linux health criteria aren’t modifiable, because their health state is already set to *true*. The health state displays the *comparisonOperator* with a value **LessThan** and *threshold* value of **1** when queried from the Workload Monitoring API for the entity, depending on its context:
689
-
- Logical Disk Status – Logical disk isn't online/ available
690
-
- Disk Status – Disk isn't online/ available
691
-
- Network Adapter Status - Network adapter is disabled
692
-
693
-
### How do I modify alerts that are included with the Health feature?
694
-
Alert rules that are defined for each health criterion aren't displayed in the Azure portal. You can enable or disable a health alert rule only in the [Workload Monitor API](https://docs.microsoft.com/rest/api/monitor/microsoft.workloadmonitor/components). Also, you can't assign an [Azure Monitor action group](platform/action-groups.md) for health alerts in the Azure portal. You can only use the notification setting API to configure an action group to be triggered whenever a health alert is fired. Currently, you can assign action groups against a VM so that all *health alerts* fired against the VM trigger the same action groups. Unlike traditional Azure alerts, there's no concept of a separate action group for each health alert rule. Additionally, only action groups that are configured to provide email or SMS notifications are supported when health alerts are triggered.
695
652
696
-
### I don’t see some or any data in the performance charts for my VM
653
+
### I don't see some or any data in the performance charts for my VM
697
654
Our performance charts have been updated to use data stored in the *InsightsMetrics* table. To see data in these charts you will need to upgrade to use the new VM Insights solution. Please refer to our [GA FAQ](insights/vminsights-ga-release-faq.md) for additional information.
698
655
699
-
If you don’t see performance data in the disk table or in some of the performance charts then your performance counters may not be configured in the workspace. To resolve, run the following [PowerShell script](insights/vminsights-enable-at-scale-powershell.md#enable-with-powershell).
656
+
If you don't see performance data in the disk table or in some of the performance charts then your performance counters may not be configured in the workspace. To resolve, run the following [PowerShell script](insights/vminsights-enable-at-scale-powershell.md#enable-with-powershell).
700
657
701
658
702
659
### How is Azure Monitor for VMs Map feature different from Service Map?
@@ -743,7 +700,7 @@ This approximation works well for protocols that are request/response based: a s
743
700
### Are their limitations if I am on the Log Analytics Free pricing plan?
744
701
If you have configured Azure Monitor with a Log Analytics workspace using the *Free* pricing tier, Azure Monitor for VMs Map feature will only support five connected machines connected to the workspace. If you have five VMs connected to a free workspace, you disconnect one of the VMs and then later connect a new VM, the new VM is not monitored and reflected on the Map page.
745
702
746
-
Under this condition, you will be prompted with the **Try Now** option when you open the VM and select **Insights (preview)** from the left-hand pane, even after it has been installed already on the VM. However, you are not prompted with options as would normally occur if this VM were not onboarded to Azure Monitor for VMs.
703
+
Under this condition, you will be prompted with the **Try Now** option when you open the VM and select **Insights** from the left-hand pane, even after it has been installed already on the VM. However, you are not prompted with options as would normally occur if this VM were not onboarded to Azure Monitor for VMs.
0 commit comments