You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-diagnostics.md
+6-7Lines changed: 6 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,13 +34,13 @@ You have the following options to store the logs in your preferred location.
34
34
35
35
**Log Analytic workspace**: This option allows you to readily use the predefined queries, visualizations, and set alerts based on specific log conditions. The tables used by resource logs in log analytics workspace depend on what type of collection the resource is using:
36
36
37
-
**Azure diagnostics**: Data is written to the [Azure Diagnostics table](/azure/azure-monitor/reference/tables/azurediagnostics). Azure Diagnostics table is shared between multiple resource type, with each of them adding their own custom fields. When number of custom fields ingested to Azure Diagnostics table exceeds 500, new fields aren't added as top level but added to "AdditionalFields" field as dynamic key value pairs.
37
+
***Azure diagnostics**: Data is written to the [Azure Diagnostics table](/azure/azure-monitor/reference/tables/azurediagnostics). Azure Diagnostics table is shared between multiple resource type, with each of them adding their own custom fields. When number of custom fields ingested to Azure Diagnostics table exceeds 500, new fields aren't added as top level but added to "AdditionalFields" field as dynamic key value pairs.
38
38
39
-
**Resource-specific(recommended)**: Data is written to dedicated tables for each category of the resource. In resource specific mode, each log category selected in the diagnostic setting is assigned its own table within the chosen workspace. This has several benefits, including:
40
-
- Easier data manipulation in log queries
41
-
- Improved discoverability of schemas and their structures
42
-
- Enhanced performance in terms of ingestion latency and query times
43
-
- The ability to assign [Azure role-based access control rights to specific tables](../azure-monitor/logs/manage-access.md?tabs=portal#set-table-level-read-access)
39
+
***Resource-specific(recommended)**: Data is written to dedicated tables for each category of the resource. In resource specific mode, each log category selected in the diagnostic setting is assigned its own table within the chosen workspace. This has several benefits, including:
40
+
- Easier data manipulation in log queries
41
+
- Improved discoverability of schemas and their structures
42
+
- Enhanced performance in terms of ingestion latency and query times
43
+
- The ability to assign [Azure role-based access control rights to specific tables](../azure-monitor/logs/manage-access.md?tabs=portal#set-table-level-read-access)
44
44
45
45
For Application Gateway, resource specific mode creates three tables:
@@ -163,7 +163,6 @@ The access log is generated only if you've enabled it on each Application Gatewa
163
163
|serverResponseLatency| Latency of the response (in **seconds**) from the backend server.|
164
164
|host| Address listed in the host header of the request. If rewritten using header rewrite, this field contains the updated host name|
165
165
|originalRequestUriWithArgs| This field contains the original request URL |
166
-
|requestUri| This field contains the URL after the rewrite operation on Application Gateway |
167
166
|upstreamSourcePort| The source port used by Application Gateway when initiating a connection to the backend target|
168
167
|originalHost| This field contains the original request host name|
169
168
|error_info|The reason for the 4xx and 5xx error. Displays an error code for a failed request. More details in [Error code information.](./application-gateway-diagnostics.md#error-code-information) |
Copy file name to clipboardExpand all lines: articles/azure-government/compare-azure-government-global-azure.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -193,10 +193,13 @@ The following features of Azure OpenAI are available in Azure Government:
193
193
|Virtual network support & private link support|Yes, unless using [Azure OpenAI on your data](../ai-services/openai/concepts/use-your-data.md)|
194
194
|Managed Identity|Yes, via Microsoft Entra ID|
195
195
|UI experience|**Azure portal** for account & resource management<br>**Azure OpenAI Studio** for model exploration|
196
+
|Abuse Monitoring|Not all features of Abuse Monitoring are enabled for AOAI in Azure Government. You will be responsible for implementing reasonable technical and operational measures to detect and mitigate any use of the service in violation of the Product Terms. [Automated Content Classification and Filtering](../ai-services/openai/concepts/content-filter.md) remains enabled by default for Azure Government.|
197
+
|Data Storage|In AOAI, customer data is only stored at rest as part of our Finetuning solution. Since Finetuning is not enabled within Azure Gov, there is no customer data stored at rest in Azure Gov associated with AOAI. However, Customer Managed Keys (CMK) can still be enabled in Azure Gov to support use of the same policies in Azure Gov as in Public cloud. Note also that if Finetuning is enabled in Azure Gov in the future, any existing CMK deployment would be applied to that data at that time.|
196
198
197
199
**Next steps**
198
200
* Get started by requesting access to Azure OpenAI Service in Azure Government at [https://aka.ms/AOAIgovaccess](https://aka.ms/AOAIgovaccess)
199
201
* Request quota increases for the pay-as-you-go consumption model, please fill out a separate form at [https://aka.ms/AOAIGovQuota](https://aka.ms/AOAIGovQuota)
202
+
* If modified content filters are required, apply at [https://aka.ms/AOAIGovModifyContentFilter](https://aka.ms/AOAIGovModifyContentFilter)
200
203
201
204
202
205
### [Azure AI services: Translator](../ai-services/translator/index.yml)
@@ -403,7 +406,7 @@ Azure Front Door (AFD) Standard and Premium tiers are available in general avail
Traffic Manager health checks can originate from certain IP addresses for Azure Government. Review the [IP addresses in the JSON file](https://azuretrafficmanagerdata.blob.core.windows.net/probes/azure-gov/probe-ip-ranges.json) to ensure that incoming connections from these IP addresses are allowed at the endpoints to check its health status.
409
+
Traffic Manager health checks can originate from certain IP addresses for Azure Government. Review the [IP addresses in the JSON file](https://www.microsoft.com/en-us/download/details.aspx?id=57063) to ensure that incoming connections from these IP addresses are allowed at the endpoints to check its health status.
Copy file name to clipboardExpand all lines: articles/azure-monitor/app/application-insights-asp-net-agent.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -661,9 +661,9 @@ In this example;
661
661
-**DemoWebApp333** has been manually instrumented using the Application Insights SDK. Application Insights Agent detected the SDK and doesn't monitor this site.
662
662
663
663
664
-
-`AppAlreadyInstrumented : true`indicates that the web app running on that specific w3wp.exe process is already instrumented using a manual SDK in code and the instrumentation shipped by the on-premises agent is not in effect.
664
+
-The presence of `AppAlreadyInstrumented : true`signifies that the Application Insights agent identified a [conflicting dll](https://learn.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/agent/status-monitor-v2-troubleshoot) loaded in the web application, assumed that the web app is manually instrumented, and the agent has backed-off and is not instrumenting this process.
665
665
666
-
-`Instrumented : true` indicates that the web app running on that specific w3wp.exe process was successfully instrumented by the on-premises agent.
666
+
-`Instrumented : true` indicates that the Application Insights agent successfully instrumented the web app running in the specified w3wp.exe process.
Copy file name to clipboardExpand all lines: articles/azure-resource-manager/management/azure-subscription-service-limits.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Azure subscription limits and quotas
3
3
description: Provides a list of common Azure subscription and service limits, quotas, and constraints. This article includes information on how to increase limits along with maximum values.
4
4
ms.topic: conceptual
5
-
ms.date: 04/08/2024
5
+
ms.date: 06/13/2024
6
6
---
7
7
8
8
# Azure subscription and service limits, quotas, and constraints
@@ -101,7 +101,6 @@ This section provides information about limits that apply to Azure API Managemen
0 commit comments