Skip to content

Commit 6018e39

Browse files
committed
Changing the applicable occurrences of the word 'blade' to 'pane'
1 parent 170c649 commit 6018e39

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

articles/azure-monitor/alerts/alerts-logic-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ To trigger your Logic app, create an action group, then create an alert that use
179179
1. Select **OK**.
180180
1. Enter a name in the **Name** field.
181181
1. Select **Review + create**, the **Create**.
182-
:::image type="content" source="./media/alerts-logic-apps/create-action-group-actions.png" alt-text="A screenshot showing the Logic Apps blade of a create action group, actions tab.":::
182+
:::image type="content" source="./media/alerts-logic-apps/create-action-group-actions.png" alt-text="A screenshot showing the Logic Apps pane of a create action group, actions tab.":::
183183

184184
## Test your action group
185185

@@ -204,7 +204,7 @@ The following email will be sent to the specified account:
204204
1. Select your action group from the list.
205205
1. Select **Select**.
206206
1. Finish the creation of your rule.
207-
:::image type="content" source="./media/alerts-logic-apps/select-action-groups.png" alt-text="A screenshot showing the actions tab of the create rules page and the select action groups blade.":::
207+
:::image type="content" source="./media/alerts-logic-apps/select-action-groups.png" alt-text="A screenshot showing the actions tab of the create rules page and the select action groups pane.":::
208208

209209
## Next steps
210210

articles/azure-monitor/alerts/alerts-smart-detections-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ A new set of alert rules is created when migrating an Application Insights resou
3434
| Potential security issue detected (preview) | *discontinued* <sup>(3)</sup> |
3535
| Abnormal rise in daily data volume (preview) | *discontinued* <sup>(3)</sup> |
3636

37-
<sup>(1)</sup> Name of rule as appears in smart detection Settings blade
37+
<sup>(1)</sup> Name of rule as appears in smart detection Settings pane
3838
<sup>(2)</sup> Name of new alert rule after migration
3939
<sup>(3)</sup> These smart detection capabilities aren't converted to alerts, because of low usage and reassessment of detection effectiveness. These detectors will no longer be supported for this resource once its migration is completed.
4040

articles/azure-monitor/alerts/proactive-diagnostics.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: yagil
1515
1616
Smart detection automatically warns you of potential performance problems and failure anomalies in your web application. It performs proactive analysis of the telemetry that your app sends to [Application Insights](../app/app-insights-overview.md). If there is a sudden rise in failure rates, or abnormal patterns in client or server performance, you get an alert. This feature needs no configuration. It operates if your application sends enough telemetry.
1717

18-
You can access the detections issued by smart detection both from the emails you receive, and from the smart detection blade.
18+
You can access the detections issued by smart detection both from the emails you receive, and from the smart detection pane.
1919

2020
## Review your smart detections
2121
You can discover detections in two ways:
@@ -25,7 +25,7 @@ You can discover detections in two ways:
2525
![Email alert](./media/proactive-diagnostics/03.png)
2626

2727
Click the large button to open more detail in the portal.
28-
* **The smart detection blade** in Application Insights. Select **Smart detection** under the **Investigate** menu to see a list of recent detections.
28+
* **The smart detection pane** in Application Insights. Select **Smart detection** under the **Investigate** menu to see a list of recent detections.
2929

3030
![View recent detections](./media/proactive-diagnostics/04.png)
3131

@@ -45,7 +45,7 @@ Smart detection detects and notifies about various issues, such as:
4545

4646
All smart detection rules, except for rules marked as _preview_, are configured by default to send email notifications when detections are found.
4747

48-
Configuring email notifications for a specific smart detection rule can be done by opening the smart detection **Settings** blade and selecting the rule, which will open the **Edit rule** blade.
48+
Configuring email notifications for a specific smart detection rule can be done by opening the smart detection **Settings** pane and selecting the rule, which will open the **Edit rule** pane.
4949

5050
Alternatively, you can change the configuration using Azure Resource Manager templates. For more information, see [Manage Application Insights smart detection rules using Azure Resource Manager templates](./proactive-arm-config.md) for more details.
5151

articles/azure-monitor/alerts/proactive-performance-diagnostics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The notifications include diagnostic information. Here's an example:
4242
2. **Scope**. Is the problem affecting all traffic, or just some pages? Is it restricted to particular browsers or locations? This information can be obtained from the notification.
4343
3. **Diagnose**. Often, the diagnostic information in the notification will suggest the nature of the problem. For example, if response time slows down when request rate is high, it may indicate that your server or dependencies are beyond their capacity.
4444

45-
Otherwise, open the Performance blade in Application Insights. You'll find there [Profiler](../profiler/profiler.md) data. If exceptions are thrown, you can also try the [snapshot debugger](../snapshot-debugger/snapshot-debugger.md).
45+
Otherwise, open the Performance pane in Application Insights. You'll find there [Profiler](../profiler/profiler.md) data. If exceptions are thrown, you can also try the [snapshot debugger](../snapshot-debugger/snapshot-debugger.md).
4646

4747
## Configure Email Notifications
4848

0 commit comments

Comments
 (0)