Skip to content

Commit 8680e2d

Browse files
committed
2 parents def57c6 + 9b6c5e8 commit 8680e2d

File tree

2 files changed

+31
-5
lines changed

2 files changed

+31
-5
lines changed

articles/azure-monitor/essentials/app-insights-metrics.md

Lines changed: 30 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -316,7 +316,7 @@ The metric shows how much of the total processor capacity is consumed by the pro
316316

317317
|Unit of measure|Supported aggregations|Supported dimensions|
318318
|---|---|---|
319-
|Percentage|Average, Min, Max|Cloud role instance
319+
|Percentage|Average, Min, Max|Cloud role instance|
320320

321321
```Kusto
322322
performanceCounters
@@ -333,7 +333,7 @@ performanceCounters
333333

334334
|Unit of measure|Supported aggregations|Supported dimensions|
335335
|---|---|---|
336-
|Bytes per second|Average, Min, Max|Cloud role instance
336+
|Bytes per second|Average, Min, Max|Cloud role instance|
337337

338338
```Kusto
339339
performanceCounters
@@ -349,7 +349,7 @@ Amount of non-shared memory that the monitored process allocated for its data.
349349

350350
|Unit of measure|Supported aggregations|Supported dimensions|
351351
|---|---|---|
352-
|Bytes|Average, Min, Max|Cloud role instance
352+
|Bytes|Average, Min, Max|Cloud role instance|
353353

354354
```Kusto
355355
performanceCounters
@@ -365,7 +365,7 @@ CPU consumption by *all* processes running on the monitored server instance.
365365

366366
|Unit of measure|Supported aggregations|Supported dimensions|
367367
|---|---|---|
368-
|Percentage|Average, Min, Max|Cloud role instance
368+
|Percentage|Average, Min, Max|Cloud role instance|
369369

370370
>[!NOTE]
371371
> The processor time metric is not available for the applications hosted in Azure App Services. Use the [Process CPU](#process-cpu-performancecountersprocesscpupercentage) metric to track CPU utilization of the web applications hosted in App Services.
@@ -499,3 +499,29 @@ union traces, requests, pageViews, dependencies, customEvents, availabilityResul
499499
| summarize dcount(user_AuthenticatedId) by bin(timestamp, 1h)
500500
| render barchart
501501
```
502+
503+
## Access all your data directly with the Application Insights REST API
504+
505+
The Application Insights REST API enables programmatic retrieval of log-based metrics. It also features an optional parameter “ai.include-query-payload” that when added to a query string, prompts the API to return not only the timeseries data, but also the Kusto Query Language (KQL) statement used to fetch it. This parameter can be particularly beneficial for users aiming to comprehend the connection between raw events in Log Analytics and the resulting log-based metric.
506+
507+
To access your data directly, pass the parameter “ai.include-query-payload” to the Application Insights API in a query using KQL.
508+
509+
```Kusto
510+
api.applicationinsights.io/v1/apps/DEMO_APP/metrics/users/authenticated?api_key=DEMO_KEY&prefer=ai.include-query-payload
511+
```
512+
513+
The following is an example of a return KQL statement for the metric "Authenticated Users.” (In this example, "users/authenticated" is the metric id.)
514+
515+
```Kusto
516+
output
517+
{
518+
"value": {
519+
"start": "2024-06-21T09:14:25.450Z",
520+
"end": "2024-06-21T21:14:25.450Z",
521+
"users/authenticated": {
522+
"unique": 0
523+
}
524+
},
525+
"@ai.query": "union (traces | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (requests | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (pageViews | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (dependencies | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (customEvents | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (availabilityResults | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (exceptions | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (customMetrics | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)), (browserTimings | where timestamp >= datetime(2024-06-21T09:14:25.450Z) and timestamp < datetime(2024-06-21T21:14:25.450Z)) | where notempty(user_AuthenticatedId) | summarize ['users/authenticated_unique'] = dcount(user_AuthenticatedId)"
526+
}
527+
```

articles/sentinel/connect-microsoft-365-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,4 +175,4 @@ let Now = now();
175175

176176
In this document, you learned how to integrate Microsoft Defender XDR incidents, alerts, and advanced hunting event data from Microsoft Defender services, into Microsoft Sentinel, by using the Microsoft Defender XDR connector.
177177

178-
To use Microsoft Sentinel integrated with Defender XDR in the unified security operations platform, see [Connect data from Microsoft Defender XDR to Microsoft Sentinel](connect-microsoft-365-defender.md).
178+
To use Microsoft Sentinel integrated with Defender XDR in the unified security operations platform, see [Connect Microsoft Sentinel to Microsoft Defender XDR](/defender-xdr/microsoft-sentinel-onboard).

0 commit comments

Comments
 (0)