You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/speech-service/how-to-windows-voice-assistants-get-started.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,9 @@ To start developing a voice assistant for Windows, you need to make sure
29
29
Some resources necessary for a customized voice agent on Windows requires resources from Microsoft. The [UWP Voice Assistant Sample](windows-voice-assistants-faq.yml#the-uwp-voice-assistant-sample) provides sample versions of these resources for initial development and testing, so this section is unnecessary for initial development.
30
30
31
31
-**Keyword model:** Voice activation requires a keyword model from Microsoft in the form of a .bin file. The .bin file provided in the UWP Voice Assistant Sample is trained on the keyword *Contoso*.
32
-
-**Limited Access Feature Token:** Since the ConversationalAgent APIs provide access to microphone audio, they're protected under Limited Access Feature restrictions. To use a Limited Access Feature, you need to obtain a Limited Access Feature token connected to the package identity of your application from Microsoft.
32
+
-**Limited Access Feature Token:** Since the ConversationalAgent APIs provide access to microphone audio, they're protected under Limited Access Feature restrictions. To use a Limited Access Feature, you need to obtain a Limited Access Feature token connected to the package identity of your application from Microsoft. For more information about any Limited Access Feature or to request an unlock token, contact [Microsoft Support](https://support.serviceshub.microsoft.com/supportforbusiness/create?sapId=d15d3aa2-0512-7cb8-1df9-86221f5cbfde).
Copy file name to clipboardExpand all lines: articles/aks/start-stop-cluster.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,9 @@ You may not need to continuously run your Azure Kubernetes Service (AKS) workloa
12
12
13
13
To better optimize your costs during these periods, you can turn off, or stop, your cluster. This action stops your control plane and agent nodes, allowing you to save on all the compute costs, while maintaining all objects except standalone pods. The cluster state is stored for when you start it again, allowing you to pick up where you left off.
14
14
15
+
> [!CAUTION]
16
+
> Stopping your cluster deallocates the control plane and releases the capacity. In regions experiencing capacity constraints, customers may be unable to start a stopped cluster. We do not recommend stopping mission critical workloads for this reason.
17
+
15
18
## Before you begin
16
19
17
20
This article assumes you have an existing AKS cluster. If you need an AKS cluster, you can create one using [Azure CLI][aks-quickstart-cli], [Azure PowerShell][aks-quickstart-powershell], or the [Azure portal][aks-quickstart-portal].
Copy file name to clipboardExpand all lines: articles/aks/use-network-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -198,7 +198,7 @@ Create the AKS cluster and specify `--network-plugin azure`, and `--network-poli
198
198
If you plan on adding Windows node pools to your cluster, include the `windows-admin-username` and `windows-admin-password` parameters that meet the [Windows Server password requirements][windows-server-password].
199
199
200
200
> [!IMPORTANT]
201
-
> At this time, using Calico network policies with Windows nodes is available on new clusters by using Kubernetes version 1.20 or later with Calico 3.17.2 and requires that you use Azure CNI networking. Windows nodes on AKS clusters with Calico enabled also have [Direct Server Return (DSR)][dsr] enabled by default.
201
+
> At this time, using Calico network policies with Windows nodes is available on new clusters by using Kubernetes version 1.20 or later with Calico 3.17.2 and requires that you use Azure CNI networking. Windows nodes on AKS clusters with Calico enabled also have Floating IP enabled by default.
202
202
>
203
203
> For clusters with only Linux node pools running Kubernetes 1.20 with earlier versions of Calico, the Calico version automatically upgrades to 3.17.2.
Copy file name to clipboardExpand all lines: articles/aks/windows-best-practices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ You might want to containerize existing applications and run them using Windows
35
35
36
36
AKS uses Windows Server 2019 and Windows Server 2022 as the host OS versions and only supports process isolation. AKS doesn't support container images built by other versions of Windows Server. For more information, see [Windows container version compatibility](/virtualization/windowscontainers/deploy-containers/version-compatibility).
37
37
38
-
Windows Server 2022 is the default OS for Kubernetes version 1.25 and later. Windows Server 2019 will retire after Kubernetes version 1.32 reaches end of life (EOL). Windows Server 2022 will retire after Kubernetes version 1.34 reaches its end of life (EOL). For more information, see [AKS release notes][aks-release-notes]. To stay up to date on the latest Windows Server OS versions and learn more about our roadmap of what's planned for support on AKS, see our [AKS public roadmap](https://github.com/azure/aks/projects/1).
38
+
Windows Server 2022 is the default OS for Kubernetes version 1.25 and later. Windows Server 2019 will retire after Kubernetes version 1.32 reaches end of life. Windows Server 2022 will retire after Kubernetes version 1.34 reaches its end of life. For more information, see [AKS release notes][aks-release-notes]. To stay up to date on the latest Windows Server OS versions and learn more about our roadmap of what's planned for support on AKS, see our [AKS public roadmap](https://github.com/azure/aks/projects/1).
39
39
40
40
41
41
## Networking
@@ -63,7 +63,7 @@ To help you decide which networking mode to use, see [Choosing a network model][
63
63
64
64
When managing traffic between pods, you should apply the principle of least privilege. The Network Policy feature in Kubernetes allows you to define and enforce ingress and egress traffic rules between the pods in your cluster. For more information, see [Secure traffic between pods using network policies in AKS][network-policies-aks].
65
65
66
-
Windows pods on AKS clusters that use the Calico Network Policy enable [Floating IP][dsr] by default.
66
+
Windows pods on AKS clusters that use the Calico Network Policy enable Floating IP by default.
Copy file name to clipboardExpand all lines: articles/api-management/how-to-configure-local-metrics-logs.md
+78-22Lines changed: 78 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Configure local metrics and logs for Azure API Management self-hosted gateway | Microsoft Docs
3
-
description: Learn how to configure local metrics and logs for Azure API Management self-hosted gateway on a Kubernetes cluster
3
+
description: Learn how to configure local metrics and logs for Azure API Management self-hosted gateway on a Kubernetes cluster.
4
4
services: api-management
5
5
author: dlepow
6
6
manager: gwallace
7
7
ms.service: api-management
8
8
ms.topic: article
9
-
ms.date: 05/11/2021
9
+
ms.date: 04/12/2024
10
10
ms.author: danlep
11
11
---
12
12
@@ -22,7 +22,7 @@ The self-hosted gateway supports [StatsD](https://github.com/statsd/statsd), whi
22
22
23
23
### Deploy StatsD and Prometheus to the cluster
24
24
25
-
Below is a sample YAML configuration for deploying StatsD and Prometheus to the Kubernetes cluster where a self-hosted gateway is deployed. It also creates a [Service](https://kubernetes.io/docs/concepts/services-networking/service/) for each. The self-hosted gateway will publish metrics to the StatsD Service. We will access the Prometheus dashboard via its Service.
25
+
The following sample YAML configuration deploys StatsD and Prometheus to the Kubernetes cluster where a self-hosted gateway is deployed. It also creates a [Service](https://kubernetes.io/docs/concepts/services-networking/service/) for each. The self-hosted gateway then publishes metrics to the StatsD Service. We'll access the Prometheus dashboard via its Service.
26
26
27
27
> [!NOTE]
28
28
> The following example pulls public container images from Docker Hub. We recommend that you set up a pull secret to authenticate using a Docker Hub account instead of making an anonymous pull request. To improve reliability when working with public content, import and manage the images in a private Azure container registry. [Learn more about working with public images.](../container-registry/buffer-gate-public-content.md)
@@ -119,21 +119,21 @@ spec:
119
119
app: sputnik-metrics
120
120
```
121
121
122
-
Save the configurations to a file named `metrics.yaml` and use the below command to deploy everything to the cluster:
122
+
Save the configurations to a file named `metrics.yaml`. Use the following command to deploy everything to the cluster:
123
123
124
124
```console
125
125
kubectl apply -f metrics.yaml
126
126
```
127
127
128
-
Once the deployment finishes, run the below command to check the Pods are running. Note that your pod name will be different.
128
+
Once the deployment finishes, run the following command to check the Pods are running. Your pod name will be different.
129
129
130
130
```console
131
131
kubectl get pods
132
132
NAME READY STATUS RESTARTS AGE
133
133
sputnik-metrics-f6d97548f-4xnb7 2/2 Running 0 1m
134
134
```
135
135
136
-
Run the below command to check the Services are running. Take a note of the `CLUSTER-IP` and `PORT` of the StatsD Service, we would need it later. You can visit the Prometheus dashboard using its `EXTERNAL-IP` and `PORT`.
136
+
Run the below command to check the `services` are running. Take a note of the `CLUSTER-IP` and `PORT` of the StatsD Service, which we use later. You can visit the Prometheus dashboard using its `EXTERNAL-IP` and `PORT`.
### Configure the self-hosted gateway to emit metrics
146
146
147
-
Now that both StatsD and Prometheus have been deployed, we can update the configurations of the self-hosted gateway to start emitting metrics through StatsD. The feature can be enabled or disabled using the `telemetry.metrics.local` key in the ConfigMap of the self-hosted gateway Deployment with additional options. Below is a breakdown of the available options:
147
+
Now that both StatsD and Prometheus are deployed, we can update the configurations of the self-hosted gateway to start emitting metrics through StatsD. The feature can be enabled or disabled using the `telemetry.metrics.local` key in the ConfigMap of the self-hosted gateway Deployment with additional options. The following are the available options:
148
148
149
149
| Field | Default | Description |
150
150
| ------------- | ------------- | ------------- |
151
151
| telemetry.metrics.local | `none` | Enables logging through StatsD. Value can be `none`, `statsd`. |
Now we have everything deployed and configured, the self-hosted gateway should report metrics via StatsD. Prometheus will pick up the metrics from StatsD. Go to the Prometheus dashboard using the `EXTERNAL-IP` and `PORT` of the Prometheus Service.
185
+
Now we have everything deployed and configured, the self-hosted gateway should report metrics via StatsD. Prometheus then picks up the metrics from StatsD. Go to the Prometheus dashboard using the `EXTERNAL-IP` and `PORT` of the Prometheus Service.
186
186
187
187
Make some API calls through the self-hosted gateway, if everything is configured correctly, you should be able to view below metrics:
188
188
189
189
| Metric | Description |
190
190
| ------------- | ------------- |
191
191
| requests_total | Number of API requests in the period |
192
192
| request_duration_seconds | Number of milliseconds from the moment gateway received request until the moment response sent in full |
193
-
| request_backend_duration_seconds | Number of milliseconds spent on overall backend IO (connecting, sending and receiving bytes) |
194
-
| request_client_duration_seconds | Number of milliseconds spent on overall client IO (connecting, sending and receiving bytes) |
193
+
| request_backend_duration_seconds | Number of milliseconds spent on overall backend IO (connecting, sending, and receiving bytes) |
194
+
| request_client_duration_seconds | Number of milliseconds spent on overall client IO (connecting, sending, and receiving bytes) |
195
195
196
196
## Logs
197
197
@@ -203,20 +203,20 @@ kubectl logs <pod-name>
203
203
204
204
If your self-hosted gateway is deployed in Azure Kubernetes Service, you can enable [Azure Monitor for containers](../azure-monitor/containers/container-insights-overview.md) to collect `stdout` and `stderr` from your workloads and view the logs in Log Analytics.
205
205
206
-
The self-hosted gateway also supports a number of protocols including `localsyslog`, `rfc5424`, and `journal`. The below table summarizes all the options supported.
206
+
The self-hosted gateway also supports many protocols including `localsyslog`, `rfc5424`, and `journal`. The following table summarizes all the options supported.
207
207
208
208
| Field | Default | Description |
209
209
| ------------- | ------------- | ------------- |
210
210
| telemetry.logs.std | `text` | Enables logging to standard streams. Value can be `none`, `text`, `json` |
211
211
| telemetry.logs.local | `auto` | Enables local logging. Value can be `none`, `auto`, `localsyslog`, `rfc5424`, `journal`, `json` |
| telemetry.logs.local.localsyslog.endpoint | n/a | Specifies local syslog endpoint. For details, see [using local syslog logs](#using-local-syslog-logs). |
| telemetry.logs.local.json.endpoint | 127.0.0.1:8888 | Specifies UDP endpoint that accepts JSON data: file path, IP:port, or hostname:port.
218
218
219
-
Here is a sample configuration of local logging:
219
+
Here's a sample configuration of local logging:
220
220
221
221
```yaml
222
222
apiVersion: v1
@@ -230,9 +230,65 @@ Here is a sample configuration of local logging:
230
230
telemetry.logs.local.localsyslog.facility: "7"
231
231
```
232
232
233
-
### Using local syslog logs on Azure Kubernetes Service (AKS)
233
+
### Using local syslog logs
234
234
235
-
When configuring to use localsyslog on Azure Kubernetes Service, you can choose two ways to explore the logs:
235
+
#### Configuring gateway to stream logs
236
+
237
+
When using local syslog as a destination for logs, the runtime needs to allow streaming logs to the destination. For Kubernetes, a volume needs to be mounted which that matches the destination.
| gateway.name |Id of the self-hosted gateway resource. | Yes, when using Microsoft Entra authentication | N/A | v2.3+ |
32
+
| gateway.name |ID of the self-hosted gateway resource. | Yes, when using Microsoft Entra authentication | N/A | v2.3+ |
33
33
| config.service.endpoint | Configuration endpoint in Azure API Management for the self-hosted gateway. Find this value in the Azure portal under **Gateways** > **Deployment**. | Yes | N/A | v2.0+ |
34
34
| config.service.auth | Defines how the self-hosted gateway should authenticate to the Configuration API. Currently gateway token and Microsoft Entra authentication are supported. | Yes | N/A | v2.0+ |
35
35
| config.service.auth.azureAd.tenantId | ID of the Microsoft Entra tenant. | Yes, when using Microsoft Entra authentication | N/A | v2.3+ |
@@ -98,7 +98,7 @@ This guidance helps you provide the required information to define how to authen
98
98
| telemetry.logs.std.level | Defines the log level of logs sent to standard stream. Value is one of the following options: `all`, `debug`, `info`, `warn`, `error` or `fatal`. | No |`info`| v2.0+ |
99
99
| telemetry.logs.std.color | Indication whether or not colored logs should be used in standard stream. | No |`true`| v2.0+ |
100
100
| telemetry.logs.local |[Enable local logging](how-to-configure-local-metrics-logs.md#logs). Value is one of the following options: `none`, `auto`, `localsyslog`, `rfc5424`, `journal`, `json`| No |`auto`| v2.0+ |
101
-
| telemetry.logs.local.localsyslog.endpoint | localsyslog endpoint. | Yes if `telemetry.logs.local` is set to `localsyslog`; otherwise no. | N/A | v2.0+ |
101
+
| telemetry.logs.local.localsyslog.endpoint | localsyslog endpoint. | Yes if `telemetry.logs.local` is set to `localsyslog`; otherwise no. See [local syslog documentation](how-to-configure-local-metrics-logs.md#using-local-syslog-logs) for more details on configuration. | N/A | v2.0+ |
102
102
| telemetry.logs.local.localsyslog.facility | Specifies localsyslog [facility code](https://en.wikipedia.org/wiki/Syslog#Facility), for example, `7`. | No | N/A | v2.0+ |
103
103
| telemetry.logs.local.rfc5424.endpoint | rfc5424 endpoint. | Yes if `telemetry.logs.local` is set to `rfc5424`; otherwise no. | N/A | v2.0+ |
104
104
| telemetry.logs.local.rfc5424.facility | Facility code per [rfc5424](https://tools.ietf.org/html/rfc5424), for example, `7`| No | N/A | v2.0+ |
0 commit comments