Skip to content

Commit 9f776c8

Browse files
Merge pull request #218791 from v-jbasden/jbasden-change-blade-to-pane-across-azure-monitor
[BULK UPDATE #1] Changing "blade" to "pane"
2 parents f58d8b2 + 5253239 commit 9f776c8

10 files changed

+20
-20
lines changed

articles/azure-monitor/agents/azure-monitor-agent-troubleshoot-linux-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
2020
1. **Carefully review the [prerequisites here](./azure-monitor-agent-manage.md#prerequisites).**
2121

2222
2. **Verify that the extension was successfully installed and provisioned, which installs the agent binaries on your machine**:
23-
1. Open Azure portal > select your virtual machine > Open **Settings** : **Extensions + applications** blade from left menu > 'AzureMonitorLinuxAgent'should show up with Status: 'Provisioning succeeded'
23+
1. Open Azure portal > select your virtual machine > Open **Settings** : **Extensions + applications** from the pane on the left > 'AzureMonitorLinuxAgent'should show up with Status: 'Provisioning succeeded'
2424
2. If you don't see the extension listed, check if machine can reach Azure and find the extension to install using the command below:
2525
```azurecli
2626
az vm extension image list-versions --location <machine-region> --name AzureMonitorLinuxAgent --publisher Microsoft.Azure.Monitor
@@ -43,7 +43,7 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
4343

4444
4. **Verify that the DCR exists and is associated with the virtual machine:**
4545
1. If using Log Analytics workspace as destination, verify that DCR exists in the same physical region as the Log Analytics workspace.
46-
2. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** blade from left menu > You should see the virtual machine listed here.
46+
2. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** from the pane on the left > You should see the virtual machine listed here.
4747
3. If not listed, click 'Add' and select your virtual machine from the resource picker. Repeat across all DCRs.
4848
4. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'DCR not found or associated' and **Problem type** as 'I need help configuring data collection from a VM'.
4949

articles/azure-monitor/agents/azure-monitor-agent-troubleshoot-windows-arc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
2020
1. **Carefully review the [prerequisites here](./azure-monitor-agent-manage.md#prerequisites).**
2121

2222
2. **Verify that the extension was successfully installed and provisioned, which installs the agent binaries on your machine**:
23-
1. Open Azure portal > select your Arc-enabled server > Open **Settings** : **Extensions** blade from left menu > 'AzureMonitorWindowsAgent'should show up with Status: 'Succeeded'
23+
1. Open Azure portal > select your Arc-enabled server > Open **Settings** : **Extensions** from the pane on the left > 'AzureMonitorWindowsAgent'should show up with Status: 'Succeeded'
2424
2. If not, check if the Arc agent (Connected Machine Agent) is able to connect to Azure and the extension service is running.
2525
```azurecli
2626
azcmagent show
@@ -51,7 +51,7 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
5151
4. **Verify that the DCR exists and is associated with the Arc-enabled server:**
5252
1. If using Log Analytics workspace as destination, verify that DCR exists in the same physical region as the Log Analytics workspace.
5353
2. On your Arc-enabled server, verify the existence of the file `C:\Resources\Directory\AMADataStore\mcs\mcsconfig.latest.xml`. If this file doesn't exist, the Arc-enabled server may not be associated with a DCR.
54-
3. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** blade from left menu > You should see the Arc-enabled server listed here
54+
3. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** from the pane on the left > You should see the Arc-enabled server listed here
5555
4. If not listed, click 'Add' and select your Arc-enabled server from the resource picker. Repeat across all DCRs.
5656
5. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'DCR not found or associated' and **Problem type** as 'I need help configuring data collection from a VM'.
5757

articles/azure-monitor/agents/azure-monitor-agent-troubleshoot-windows-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
1919
1. **Carefully review the [prerequisites here](./azure-monitor-agent-manage.md#prerequisites).**
2020

2121
2. **Verify that the extension was successfully installed and provisioned, which installs the agent binaries on your machine**:
22-
1. Open Azure portal > select your virtual machine > Open **Settings** : **Extensions + applications** blade from left menu > 'AzureMonitorWindowsAgent'should show up with Status: 'Provisioning succeeded'
22+
1. Open Azure portal > select your virtual machine > Open **Settings** : **Extensions + applications** from the pane on the left > 'AzureMonitorWindowsAgent'should show up with Status: 'Provisioning succeeded'
2323
2. If not, check if machine can reach Azure and find the extension to install using the command below:
2424
```azurecli
2525
az vm extension image list-versions --location <machine-region> --name AzureMonitorWindowsAgent --publisher Microsoft.Azure.Monitor
@@ -44,7 +44,7 @@ Follow the steps below to troubleshoot the latest version of the Azure Monitor a
4444
- The virtual machine may not have Managed Identity enabled. [See here](../../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md#enable-system-assigned-managed-identity-during-creation-of-a-vm) on how to enable.
4545
- IMDS service is not running/accessible from the virtual machine. [Check if you can access IMDS from the machine](../../virtual-machines/windows/instance-metadata-service.md?tabs=windows). If not, [file a ticket](#file-a-ticket) with **Summary** as 'IMDS service not running' and **Problem type** as 'I need help configuring data collection from a VM'.
4646
- AMA cannot access IMDS. Check if you see IMDS errors in `C:\WindowsAzure\Resources\AMADataStore.<virtual-machine-name>\Tables\MAEventTable.tsf` file. If yes, [file a ticket](#file-a-ticket) with **Summary** as 'AMA cannot access IMDS' and **Problem type** as 'I need help configuring data collection from a VM'.
47-
3. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** blade from left menu > You should see the virtual machine listed here
47+
3. Open Azure portal > select your data collection rule > Open **Configuration** : **Resources** from the pane on the left > You should see the virtual machine listed here
4848
4. If not listed, click 'Add' and select your virtual machine from the resource picker. Repeat across all DCRs.
4949
5. If none of the above helps, [file a ticket](#file-a-ticket) with **Summary** as 'DCR not found or associated' and **Problem type** as 'I need help configuring data collection from a VM'.
5050

articles/azure-monitor/agents/data-sources-event-tracing-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,9 +46,9 @@ Ensure the *Windows diagnostics extension* is [installed](./diagnostics-extensio
4646

4747
### Step 3: Configure ETW log collection
4848

49-
1. Navigate to the **Diagnostic Settings** blade of the virtual machine
49+
1. From the pane on the left, navigate to the **Diagnostic Settings** for the virtual machine
5050

51-
2. Select the **Logs** tab
51+
2. Select the **Logs** tab.
5252

5353
3. Scroll down and enable the **Event tracing for Windows (ETW) events** option
5454
![Screenshot of diagnostics settings](./media/data-sources-event-tracing-windows/enable-event-tracing-windows-collection.png)

articles/azure-monitor/alerts/alerts-logic-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ To trigger your Logic app, create an action group, then create an alert that use
179179
1. Select **OK**.
180180
1. Enter a name in the **Name** field.
181181
1. Select **Review + create**, the **Create**.
182-
:::image type="content" source="./media/alerts-logic-apps/create-action-group-actions.png" alt-text="A screenshot showing the Logic Apps blade of a create action group, actions tab.":::
182+
:::image type="content" source="./media/alerts-logic-apps/create-action-group-actions.png" alt-text="A screenshot showing the Logic Apps pane of a create action group, actions tab.":::
183183

184184
## Test your action group
185185

@@ -204,7 +204,7 @@ The following email will be sent to the specified account:
204204
1. Select your action group from the list.
205205
1. Select **Select**.
206206
1. Finish the creation of your rule.
207-
:::image type="content" source="./media/alerts-logic-apps/select-action-groups.png" alt-text="A screenshot showing the actions tab of the create rules page and the select action groups blade.":::
207+
:::image type="content" source="./media/alerts-logic-apps/select-action-groups.png" alt-text="A screenshot showing the actions tab of the create rules page and the select action groups pane.":::
208208

209209
## Next steps
210210

articles/azure-monitor/alerts/alerts-smart-detections-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ A new set of alert rules is created when migrating an Application Insights resou
3434
| Potential security issue detected (preview) | *discontinued* <sup>(3)</sup> |
3535
| Abnormal rise in daily data volume (preview) | *discontinued* <sup>(3)</sup> |
3636

37-
<sup>(1)</sup> Name of rule as appears in smart detection Settings blade
37+
<sup>(1)</sup> Name of rule as appears in smart detection Settings pane
3838
<sup>(2)</sup> Name of new alert rule after migration
3939
<sup>(3)</sup> These smart detection capabilities aren't converted to alerts, because of low usage and reassessment of detection effectiveness. These detectors will no longer be supported for this resource once its migration is completed.
4040

articles/azure-monitor/alerts/proactive-diagnostics.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: yagil
1515
1616
Smart detection automatically warns you of potential performance problems and failure anomalies in your web application. It performs proactive analysis of the telemetry that your app sends to [Application Insights](../app/app-insights-overview.md). If there is a sudden rise in failure rates, or abnormal patterns in client or server performance, you get an alert. This feature needs no configuration. It operates if your application sends enough telemetry.
1717

18-
You can access the detections issued by smart detection both from the emails you receive, and from the smart detection blade.
18+
You can access the detections issued by smart detection both from the emails you receive, and from the smart detection pane.
1919

2020
## Review your smart detections
2121
You can discover detections in two ways:
@@ -25,7 +25,7 @@ You can discover detections in two ways:
2525
![Email alert](./media/proactive-diagnostics/03.png)
2626

2727
Click the large button to open more detail in the portal.
28-
* **The smart detection blade** in Application Insights. Select **Smart detection** under the **Investigate** menu to see a list of recent detections.
28+
* **The smart detection pane** in Application Insights. Select **Smart detection** under the **Investigate** menu to see a list of recent detections.
2929

3030
![View recent detections](./media/proactive-diagnostics/04.png)
3131

@@ -45,7 +45,7 @@ Smart detection detects and notifies about various issues, such as:
4545

4646
All smart detection rules, except for rules marked as _preview_, are configured by default to send email notifications when detections are found.
4747

48-
Configuring email notifications for a specific smart detection rule can be done by opening the smart detection **Settings** blade and selecting the rule, which will open the **Edit rule** blade.
48+
Configuring email notifications for a specific smart detection rule can be done by opening the smart detection **Settings** pane and selecting the rule, which will open the **Edit rule** pane.
4949

5050
Alternatively, you can change the configuration using Azure Resource Manager templates. For more information, see [Manage Application Insights smart detection rules using Azure Resource Manager templates](./proactive-arm-config.md) for more details.
5151

articles/azure-monitor/alerts/proactive-performance-diagnostics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The notifications include diagnostic information. Here's an example:
4242
2. **Scope**. Is the problem affecting all traffic, or just some pages? Is it restricted to particular browsers or locations? This information can be obtained from the notification.
4343
3. **Diagnose**. Often, the diagnostic information in the notification will suggest the nature of the problem. For example, if response time slows down when request rate is high, it may indicate that your server or dependencies are beyond their capacity.
4444

45-
Otherwise, open the Performance blade in Application Insights. You'll find there [Profiler](../profiler/profiler.md) data. If exceptions are thrown, you can also try the [snapshot debugger](../snapshot-debugger/snapshot-debugger.md).
45+
Otherwise, open the Performance pane in Application Insights. You'll find there [Profiler](../profiler/profiler.md) data. If exceptions are thrown, you can also try the [snapshot debugger](../snapshot-debugger/snapshot-debugger.md).
4646

4747
## Configure Email Notifications
4848

articles/azure-monitor/containers/container-insights-enable-arc-enabled-clusters.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -156,11 +156,11 @@ az k8s-extension create --name azuremonitor-containers --cluster-name <cluster-n
156156
>[!IMPORTANT]
157157
> If you are deploying Azure Monitor on a Kubernetes cluster running on top of Azure Stack Edge, then the Azure CLI option needs to be followed instead of the Azure portal option as a custom mount path needs to be set for these clusters.
158158
159-
### Onboarding from the Azure Arc-enabled Kubernetes resource blade
159+
### Onboarding from the Azure Arc-enabled Kubernetes resource pane
160160

161161
1. In the Azure portal, select the Azure Arc-enabled Kubernetes cluster that you wish to monitor.
162162

163-
2. Select the 'Insights' item under the 'Monitoring' section of the resource blade.
163+
2. From the resource pane on the left, select the 'Insights' item under the 'Monitoring' section.
164164

165165
3. On the onboarding page, select the 'Configure Azure Monitor' button
166166

@@ -210,7 +210,7 @@ Once you have successfully created the Azure Monitor extension for your Azure Ar
210210

211211
### [Azure portal](#tab/verify-portal)
212212
1. In the Azure portal, select the Azure Arc-enabled Kubernetes cluster with the extension installing
213-
2. Select the 'Extensions' item under the 'Settings' section of the resource blade
213+
2. From the resource pane on the left, select the 'Extensions' item under the 'Settings' section.
214214
3. You should see an extension with the name 'azuremonitor-containers' listed, with the listed status in the 'Install status' column
215215
### [CLI](#tab/verify-cli)
216216
Run the following command to show the latest status of the `Microsoft.AzureMonitor.Containers` extension

articles/azure-monitor/essentials/collect-custom-metrics-guestos-vm-classic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The process that's outlined in this article only works on classic virtual machin
3838

3939
1. When you're creating this VM, choose the option to create a new classic storage account. We use this storage account in later steps.
4040

41-
1. In the Azure portal, go to the **Storage accounts** resource blade. Select **Keys**, and take note of the storage account name and storage account key. You need this information in later steps.
41+
1. In the Azure portal, go to the **Storage accounts** resource pane. Select **Keys**, and take note of the storage account name and storage account key. You need this information in later steps.
4242
![Storage access keys](./media/collect-custom-metrics-guestos-vm-classic/storage-access-keys.png)
4343

4444
## Create a service principal
@@ -185,7 +185,7 @@ Give this app “Monitoring Metrics Publisher” permissions to the resource tha
185185

186186
1. On the left menu, select **Monitor.**
187187

188-
1. On the **Monitor** blade, select **Metrics**.
188+
1. On the **Monitor** pane on the left, select **Metrics**.
189189

190190
![Navigate metrics](./media/collect-custom-metrics-guestos-vm-classic/navigate-metrics.png)
191191

0 commit comments

Comments
 (0)