Skip to content

Commit a2f95d5

Browse files
authored
Merge pull request #231706 from hangwan97/consumption_cli
Added pivot zone to distinguish consumption plan
2 parents 91d2cd5 + 2c4ac1e commit a2f95d5

File tree

5 files changed

+173
-158
lines changed

5 files changed

+173
-158
lines changed

articles/spring-apps/how-to-application-insights.md

Lines changed: 28 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Application Insights can provide many observable perspectives, including:
4343

4444
When the **Application Insights** feature is enabled, you can:
4545

46-
* In the left navigation pane, select **Application Insights** to view the **Overview** page of Application Insights. The **Overview** page will show you an overview of all running applications.
46+
* In the left navigation pane, select **Application Insights** to view the **Overview** page of Application Insights. The **Overview** page shows you an overview of all running applications.
4747
* Select **Application Map** to see the status of calls between applications.
4848

4949
:::image type="content" source="media/how-to-application-insights/insights-process-agent-map.png" alt-text="Screenshot of Azure portal Application Insights with Application map page showing." lightbox="media/how-to-application-insights/insights-process-agent-map.png":::
@@ -59,7 +59,7 @@ When the **Application Insights** feature is enabled, you can:
5959

6060
:::image type="content" source="media/how-to-application-insights/insights-process-agent-failures.png" alt-text="Screenshot of Azure portal Application Insights with Failures page showing." lightbox="media/how-to-application-insights/insights-process-agent-failures.png":::
6161

62-
* In the left navigation pane, select **Metrics** and select the namespace, you'll see both Spring Boot metrics and custom metrics, if any.
62+
* In the left navigation pane, select **Metrics** and select the namespace to see both Spring Boot metrics and custom metrics, if any.
6363

6464
:::image type="content" source="media/how-to-application-insights/insights-process-agent-metrics.png" alt-text="Screenshot of Azure portal Application Insights with Metrics page showing." lightbox="media/how-to-application-insights/insights-process-agent-metrics.png":::
6565

@@ -77,7 +77,7 @@ When the **Application Insights** feature is enabled, you can:
7777

7878
## Manage Application Insights using the Azure portal
7979

80-
::: zone pivot="sc-standard-tier"
80+
::: zone pivot="sc-standard"
8181

8282
Enable the Java In-Process Agent by using the following procedure.
8383

@@ -91,11 +91,11 @@ Enable the Java In-Process Agent by using the following procedure.
9191
1. Select **Save** to save the change.
9292

9393
> [!NOTE]
94-
> Do not use the same Application Insights instance in different Azure Spring Apps instances, or you'll see mixed data.
94+
> Don't use the same Application Insights instance in different Azure Spring Apps instances, or you'll see mixed data.
9595
9696
::: zone-end
9797

98-
::: zone pivot="sc-enterprise-tier"
98+
::: zone pivot="sc-enterprise"
9999

100100
You can use the Portal to check or update the current settings in Application Insights.
101101

@@ -149,7 +149,7 @@ You can manage Application Insights using Azure CLI commands. In the following c
149149

150150
To configure Application Insights when creating an Azure Spring Apps instance, use the following command. For the `app-insights` argument, you can specify an Application Insights name or resource ID.
151151

152-
::: zone pivot="sc-standard-tier"
152+
::: zone pivot="sc-standard"
153153

154154
```azurecli
155155
az spring create \
@@ -161,7 +161,7 @@ az spring create \
161161

162162
::: zone-end
163163

164-
::: zone pivot="sc-enterprise-tier"
164+
::: zone pivot="sc-enterprise"
165165

166166
```azurecli
167167
az spring create \
@@ -176,7 +176,7 @@ az spring create \
176176

177177
You can also use an Application Insights connection string (preferred) or instrumentation key, as shown in the following example.
178178

179-
::: zone pivot="sc-standard-tier"
179+
::: zone pivot="sc-standard"
180180

181181
```azurecli
182182
az spring create \
@@ -188,7 +188,7 @@ az spring create \
188188

189189
::: zone-end
190190

191-
::: zone pivot="sc-enterprise-tier"
191+
::: zone pivot="sc-enterprise"
192192

193193
```azurecli
194194
az spring create \
@@ -205,7 +205,7 @@ az spring create \
205205

206206
To disable Application Insights when creating an Azure Spring Apps instance, use the following command:
207207

208-
::: zone pivot="sc-standard-tier"
208+
::: zone pivot="sc-standard"
209209

210210
```azurecli
211211
az spring create \
@@ -216,7 +216,7 @@ az spring create \
216216

217217
::: zone-end
218218

219-
::: zone pivot="sc-enterprise-tier"
219+
::: zone pivot="sc-enterprise"
220220

221221
```azurecli
222222
az spring create \
@@ -228,7 +228,7 @@ az spring create \
228228

229229
::: zone-end
230230

231-
::: zone pivot="sc-standard-tier"
231+
::: zone pivot="sc-standard"
232232

233233
### Check Application Insights settings
234234

@@ -275,7 +275,7 @@ az spring app-insights update \
275275

276276
::: zone-end
277277

278-
::: zone pivot="sc-enterprise-tier"
278+
::: zone pivot="sc-enterprise"
279279

280280
### Manage Application Insights buildpack bindings
281281

@@ -342,7 +342,7 @@ az spring build-service builder buildpack-binding delete \
342342

343343
## Automation
344344

345-
::: zone pivot="sc-standard-tier"
345+
::: zone pivot="sc-standard"
346346

347347
The following sections describe how to automate your deployment using Bicep, Azure Resource Manager templates (ARM templates) or Terraform.
348348

@@ -457,34 +457,34 @@ resource "azurerm_spring_cloud_service" "example" {
457457

458458
::: zone-end
459459

460-
::: zone pivot="sc-enterprise-tier"
460+
::: zone pivot="sc-enterprise"
461461

462462
Automation in Enterprise tier is pending support. Documentation will be added as soon as it's available.
463463

464464
::: zone-end
465465

466466
## Java agent update/upgrade
467467

468-
::: zone pivot="sc-standard-tier"
468+
::: zone pivot="sc-standard"
469469

470-
The Java agent will be updated/upgraded regularly with the JDK, which may affect the following scenarios.
470+
The Java agent is updated/upgraded regularly with the JDK, which may affect the following scenarios.
471471

472472
> [!NOTE]
473-
> The JDK version will be updated/upgraded quarterly per year.
473+
> The JDK version is updated/upgraded quarterly per year.
474474
475-
* Existing applications that use the Java agent before updating/upgrading won't be affected.
476-
* Applications created after updating/upgrading will use the new version of the Java agent.
477-
* Existing applications that didn't previously use the Java agent will require restart or redeployment to use the new version of the Java agent.
475+
* Existing applications that use the Java agent before updating/upgrading aren't affected.
476+
* Applications created after updating/upgrading use the new version of the Java agent.
477+
* Existing applications that didn't previously use the Java agent require restart or redeployment to use the new version of the Java agent.
478478

479479
::: zone-end
480480

481-
::: zone pivot="sc-enterprise-tier"
481+
::: zone pivot="sc-enterprise"
482482

483-
The Java agent will be updated/upgraded when the buildpack is updated.
483+
The Java agent is updated/upgraded when the buildpack is updated.
484484

485485
::: zone-end
486486

487-
::: zone pivot="sc-standard-tier"
487+
::: zone pivot="sc-standard"
488488

489489
## Java agent configuration hot-loading
490490

@@ -495,7 +495,7 @@ Azure Spring Apps has enabled a hot-loading mechanism to adjust the settings of
495495
496496
* When the Java agent has been previously enabled, changes to the Application Insights instance and/or SamplingRate do NOT require applications to be restarted.
497497
* If you enable the Java agent, then you must restart applications.
498-
* When you disable the Java agent, applications will stop to send all monitoring data after a delay in minutes. You can restart applications to remove the agent from the Java runtime environment.
498+
* When you disable the Java agent, applications stop sending all monitoring data after a delay in minutes. You can restart applications to remove the agent from the Java runtime environment.
499499

500500
::: zone-end
501501

@@ -506,7 +506,7 @@ Azure Spring Apps has enabled a hot-loading mechanism to adjust the settings of
506506
| `App` | * __Application Map__/Role<br />* __Live Metrics__/Role<br />* __Failures__/Roles/Cloud Role<br />* __Performance__/Roles/Could Role |
507507
| `App Instance` | * __Application Map__/Role Instance<br />* __Live Metrics__/Service Name<br />* __Failures__/Roles/Cloud Instance<br />* __Performance__/Roles/Could Instance |
508508

509-
The name `App Instance` from Azure Spring Apps will be changed or generated in the following scenarios:
509+
The name `App Instance` from Azure Spring Apps is changed or generated in the following scenarios:
510510

511511
* You create a new application.
512512
* You deploy a JAR file or source code to an existing application.
@@ -516,11 +516,11 @@ The name `App Instance` from Azure Spring Apps will be changed or generated in t
516516

517517
When data is stored in Application Insights, it contains the history of Azure Spring Apps app instances created or deployed since the Java agent was enabled. For example, in the Application Insights portal, you can see application data created yesterday, but then deleted within a specific time range, like the last 24 hours. The following scenarios show how this works:
518518

519-
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. After some testing, you change the code and deploy a new JAR file to this application at 8:30 AM today. Then, you take a break, and when you come back around 11:00 AM, you check some data from Application Insights. You'll see:
519+
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. After some testing, you change the code and deploy a new JAR file to this application at 8:30 AM today. Then, you take a break, and when you come back around 11:00 AM, you check some data from Application Insights. You see:
520520
* Three instances in Application Map with time ranges in the last 24 hours, and Failures, Performance, and Metrics.
521521
* One instance in Application Map with a time range in the last hour, and Failures, Performance, and Metrics.
522522
* One instance in Live Metrics.
523-
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. Around 8:30 AM today, you try a blue/green deployment with another JAR file. Currently, you have two deployments for this application. After a break around 11:00 AM today, you want to check some data from Application Insights. You'll see:
523+
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. Around 8:30 AM today, you try a blue/green deployment with another JAR file. Currently, you have two deployments for this application. After a break around 11:00 AM today, you want to check some data from Application Insights. You see:
524524
* Three instances in Application Map with time ranges in the last 24 hours, and Failures, Performance, and Metrics.
525525
* Two instances in Application Map with time ranges in last hour, and Failures, Performance, and Metrics.
526526
* Two instances in Live Metrics.

articles/spring-apps/how-to-enable-system-assigned-managed-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -26,15 +26,15 @@ Managed identities for Azure resources provide an automatically managed identity
2626

2727
If you're unfamiliar with managed identities for Azure resources, see the [Managed identities for Azure resources overview section](../active-directory/managed-identities-azure-resources/overview.md).
2828

29-
::: zone pivot="sc-enterprise-tier"
29+
::: zone pivot="sc-enterprise"
3030

3131
- An already provisioned Azure Spring Apps Enterprise tier instance. For more information, see [Quickstart: Build and deploy apps to Azure Spring Apps using the Enterprise tier](quickstart-deploy-apps-enterprise.md).
3232
- [Azure CLI version 2.30.0 or higher](/cli/azure/install-azure-cli).
3333
- [!INCLUDE [install-app-user-identity-extension](includes/install-app-user-identity-extension.md)]
3434

3535
::: zone-end
3636

37-
::: zone pivot="sc-standard-tier"
37+
::: zone pivot="sc-standard"
3838

3939
- An already provisioned Azure Spring Apps instance. For more information, see [Quickstart: Deploy your first application to Azure Spring Apps](./quickstart.md).
4040
- [Azure CLI version 2.30.0 or higher](/cli/azure/install-azure-cli).
@@ -44,7 +44,7 @@ If you're unfamiliar with managed identities for Azure resources, see the [Manag
4444

4545
## Add a system-assigned identity
4646

47-
Creating an app with a system-assigned identity requires setting an additional property on the application.
47+
Creating an app with a system-assigned identity requires setting another property on the application.
4848

4949
### [Portal](#tab/azure-portal)
5050

@@ -91,17 +91,17 @@ az spring app identity assign \
9191

9292
An app can use its managed identity to get tokens to access other resources protected by Azure Active Directory, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
9393

94-
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
94+
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
9595

9696
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. See [How to use VM token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md) for various code and script examples and guidance on important topics such as handling token expiration and HTTP errors.
9797

9898
## Disable system-assigned identity from an app
9999

100-
Removing a system-assigned identity will also delete it from Azure AD. Deleting the app resource automatically removes system-assigned identities from Azure AD.
100+
Removing a system-assigned identity also deletes it from Azure AD. Deleting the app resource automatically removes system-assigned identities from Azure AD.
101101

102102
### [Portal](#tab/azure-portal)
103103

104-
To remove system-assigned managed identity from an app that no longer needs it:
104+
Use the following steps to remove system-assigned managed identity from an app that no longer needs it:
105105

106106
1. Sign in to the portal using an account associated with the Azure subscription that contains the Azure Spring Apps instance.
107107
1. Navigate to the desired application and select **Identity**.

articles/spring-apps/how-to-manage-user-assigned-managed-identities.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Managed identities for Azure resources provide an automatically managed identity
2525

2626
- If you're unfamiliar with managed identities for Azure resources, see the [Managed identities for Azure resources overview section](../active-directory/managed-identities-azure-resources/overview.md).
2727

28-
::: zone pivot="sc-enterprise-tier"
28+
::: zone pivot="sc-enterprise"
2929

3030
- An already provisioned Azure Spring Apps Enterprise tier instance. For more information, see [Quickstart: Build and deploy apps to Azure Spring Apps using the Enterprise tier](quickstart-deploy-apps-enterprise.md).
3131
- [Azure CLI version 2.30.0 or higher](/cli/azure/install-azure-cli).
@@ -34,7 +34,7 @@ Managed identities for Azure resources provide an automatically managed identity
3434

3535
::: zone-end
3636

37-
::: zone pivot="sc-standard-tier"
37+
::: zone pivot="sc-standard"
3838

3939
- An already provisioned Azure Spring Apps instance. For more information, see [Quickstart: Deploy your first application to Azure Spring Apps](./quickstart.md).
4040
- [Azure CLI version 2.30.0 or higher](/cli/azure/install-azure-cli).
@@ -57,7 +57,7 @@ az spring app create \
5757

5858
## Assign user-assigned managed identities to an existing application
5959

60-
Assigning user-assigned managed identity requires setting an additional property on the application.
60+
Assigning user-assigned managed identity requires setting another property on the application.
6161

6262
### [Azure portal](#tab/azure-portal)
6363

@@ -87,13 +87,13 @@ az spring app identity assign \
8787

8888
An application can use its managed identity to get tokens to access other resources protected by Azure AD, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
8989

90-
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
90+
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you've added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
9191

92-
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
92+
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples, and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
9393

9494
## Remove user-assigned managed identities from an existing app
9595

96-
Removing user-assigned managed identities will remove the assignment between the identities and the application, and will not delete the identities themselves.
96+
Removing user-assigned managed identities removes the assignment between the identities and the application, and doesn't delete the identities themselves.
9797

9898
### [Azure portal](#tab/azure-portal)
9999

0 commit comments

Comments
 (0)