You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-logic-apps.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,7 +179,7 @@ To trigger your Logic app, create an action group, then create an alert that use
179
179
1. Select **OK**.
180
180
1. Enter a name in the **Name** field.
181
181
1. Select **Review + create**, the **Create**.
182
-
:::image type="content" source="./media/alerts-logic-apps/create-action-group-actions.png" alt-text="A screenshot showing the Logic Apps blade of a create action group, actions tab.":::
182
+
:::image type="content" source="./media/alerts-logic-apps/create-action-group-actions.png" alt-text="A screenshot showing the Logic Apps pane of a create action group, actions tab.":::
183
183
184
184
## Test your action group
185
185
@@ -204,7 +204,7 @@ The following email will be sent to the specified account:
204
204
1. Select your action group from the list.
205
205
1. Select **Select**.
206
206
1. Finish the creation of your rule.
207
-
:::image type="content" source="./media/alerts-logic-apps/select-action-groups.png" alt-text="A screenshot showing the actions tab of the create rules page and the select action groups blade.":::
207
+
:::image type="content" source="./media/alerts-logic-apps/select-action-groups.png" alt-text="A screenshot showing the actions tab of the create rules page and the select action groups pane.":::
| Abnormal rise in daily data volume (preview) |*discontinued* <sup>(3)</sup> |
36
36
37
-
<sup>(1)</sup> Name of rule as appears in smart detection Settings blade
37
+
<sup>(1)</sup> Name of rule as appears in smart detection Settings pane
38
38
<sup>(2)</sup> Name of new alert rule after migration
39
39
<sup>(3)</sup> These smart detection capabilities aren't converted to alerts, because of low usage and reassessment of detection effectiveness. These detectors will no longer be supported for this resource once its migration is completed.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/proactive-diagnostics.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.reviewer: yagil
15
15
16
16
Smart detection automatically warns you of potential performance problems and failure anomalies in your web application. It performs proactive analysis of the telemetry that your app sends to [Application Insights](../app/app-insights-overview.md). If there is a sudden rise in failure rates, or abnormal patterns in client or server performance, you get an alert. This feature needs no configuration. It operates if your application sends enough telemetry.
17
17
18
-
You can access the detections issued by smart detection both from the emails you receive, and from the smart detection blade.
18
+
You can access the detections issued by smart detection both from the emails you receive, and from the smart detection pane.
19
19
20
20
## Review your smart detections
21
21
You can discover detections in two ways:
@@ -25,7 +25,7 @@ You can discover detections in two ways:
@@ -45,7 +45,7 @@ Smart detection detects and notifies about various issues, such as:
45
45
46
46
All smart detection rules, except for rules marked as _preview_, are configured by default to send email notifications when detections are found.
47
47
48
-
Configuring email notifications for a specific smart detection rule can be done by opening the smart detection **Settings**blade and selecting the rule, which will open the **Edit rule**blade.
48
+
Configuring email notifications for a specific smart detection rule can be done by opening the smart detection **Settings**pane and selecting the rule, which will open the **Edit rule**pane.
49
49
50
50
Alternatively, you can change the configuration using Azure Resource Manager templates. For more information, see [Manage Application Insights smart detection rules using Azure Resource Manager templates](./proactive-arm-config.md) for more details.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/proactive-performance-diagnostics.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ The notifications include diagnostic information. Here's an example:
42
42
2.**Scope**. Is the problem affecting all traffic, or just some pages? Is it restricted to particular browsers or locations? This information can be obtained from the notification.
43
43
3.**Diagnose**. Often, the diagnostic information in the notification will suggest the nature of the problem. For example, if response time slows down when request rate is high, it may indicate that your server or dependencies are beyond their capacity.
44
44
45
-
Otherwise, open the Performance blade in Application Insights. You'll find there [Profiler](../profiler/profiler.md) data. If exceptions are thrown, you can also try the [snapshot debugger](../snapshot-debugger/snapshot-debugger.md).
45
+
Otherwise, open the Performance pane in Application Insights. You'll find there [Profiler](../profiler/profiler.md) data. If exceptions are thrown, you can also try the [snapshot debugger](../snapshot-debugger/snapshot-debugger.md).
0 commit comments