Skip to content

Commit 35a9e15

Browse files
committed
Updated as per �Blocking Issue: Ready to Merge
1 parent e7f56d5 commit 35a9e15

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

articles/azure-monitor/profiler/profiler-bring-your-own-storage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ When you configure Bring Your Own Storage (BYOS), artifacts are uploaded into a
5151

5252
For example, if your Application Insights resource is in West US 2, your Storage Account must be also in West US 2.
5353

54-
* Grant the `Storage Blob Data Contributor` role to the AAD application named `Diagnostic Services Trusted Storage Access` via the [Access Control (IAM)](/role-based-access-control/role-assignments-portal.md) page in your storage account.
54+
* Grant the `Storage Blob Data Contributor` role to the AD application named `Diagnostic Services Trusted Storage Access` via the [Access Control (IAM)](/role-based-access-control/role-assignments-portal.md) page in your storage account.
5555
* If Private Link is enabled, allow connection to our Trusted Microsoft Service from your virtual network.
5656

5757
## Enable BYOS
@@ -60,7 +60,7 @@ When you configure Bring Your Own Storage (BYOS), artifacts are uploaded into a
6060

6161
A BYOS storage account will be linked to an Application Insights resource. There may be only one storage account per Application Insights resource and both must be in the same location. You may use the same storage account with more than one Application Insights resource.
6262

63-
First, the Application Insights Profiler, and Snapshot Debugger service needs to be granted access to the storage account. To grant access, add the role `Storage Blob Data Contributor` to the AAD application named `Diagnostic Services Trusted Storage Access` via the Access Control (IAM) page in your storage account as shown in Figure 1.0.
63+
First, the Application Insights Profiler, and Snapshot Debugger service needs to be granted access to the storage account. To grant access, add the role `Storage Blob Data Contributor` to the AD application named `Diagnostic Services Trusted Storage Access` via the Access Control (IAM) page in your storage account as shown in Figure 1.0.
6464

6565
Steps:
6666

articles/azure-monitor/snapshot-debugger/snapshot-debugger-app-service.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Snapshot Debugger is pre-installed as part of the App Services runtime, but you
3131
3232
After you've deployed your .NET app:
3333

34-
1. Go to to the Azure control panel for your App Service.
34+
1. Go to the Azure control panel for your App Service.
3535
1. Go to the **Settings** > **Application Insights** page.
3636

3737
:::image type="content" source="./media/snapshot-debugger/application-insights-app-services.png" alt-text="Screenshot showing the Enable App Insights on App Services portal.":::
@@ -43,7 +43,7 @@ After you've deployed your .NET app:
4343

4444
1. Snapshot Debugger is now enabled using an App Services App Setting.
4545

46-
:::image type="content" source="./media/snapshot-debugger/snapshot-debugger-app-setting.png" alt-text="Screenshot showing App Setting for Snapshot Debugger":::
46+
:::image type="content" source="./media/snapshot-debugger/snapshot-debugger-app-setting.png" alt-text="Screenshot showing App Setting for Snapshot Debugger.":::
4747

4848
If you're running a different type of Azure service, here are instructions for enabling Snapshot Debugger on other supported platforms:
4949

@@ -84,13 +84,13 @@ For System-Assigned Identity:
8484

8585
|App Setting | Value |
8686
|---------------|----------|
87-
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AAD |
87+
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AD |
8888

8989
For User-Assigned Identity:
9090

9191
|App Setting | Value |
9292
|---------------|----------|
93-
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AAD;ClientId={Client id of the User-Assigned Identity} |
93+
|APPLICATIONINSIGHTS_AUTHENTICATION_STRING | Authorization=AD;ClientId={Client id of the User-Assigned Identity} |
9494

9595
## Disable Snapshot Debugger
9696

articles/azure-monitor/snapshot-debugger/snapshot-debugger.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ After an exception has occurred in your application and a snapshot has been crea
7171
* Select the **Operations** button when viewing the **Operations** tab, or
7272
* Select the **Exceptions** button when viewing the **Exceptions** tab.
7373

74-
:::image type="content" source="./media/snapshot-debugger/failures-page.png" alt-text="Screenshot showing the Failures Page in Azure Portal.":::
74+
:::image type="content" source="./media/snapshot-debugger/failures-page.png" alt-text="Screenshot showing the Failures Page in Azure portal.":::
7575

7676
Select an operation or exception in the right pane to open the **End-to-End Transaction Details** pane, then select the exception event. If a snapshot is available for the given exception, an **Open Debug Snapshot** button appears on the right pane with details for the [exception](../app/asp-net-exceptions.md).
7777

0 commit comments

Comments
 (0)