You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-application-insights.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ Application Insights can provide many observable perspectives, including:
43
43
44
44
When the **Application Insights** feature is enabled, you can:
45
45
46
-
* In the left navigation pane, select **Application Insights** to view the **Overview** page of Application Insights. The **Overview** page will show you an overview of all running applications.
46
+
* In the left navigation pane, select **Application Insights** to view the **Overview** page of Application Insights. The **Overview** page shows you an overview of all running applications.
47
47
* Select **Application Map** to see the status of calls between applications.
48
48
49
49
:::image type="content" source="media/how-to-application-insights/insights-process-agent-map.png" alt-text="Screenshot of Azure portal Application Insights with Application map page showing." lightbox="media/how-to-application-insights/insights-process-agent-map.png":::
@@ -59,7 +59,7 @@ When the **Application Insights** feature is enabled, you can:
59
59
60
60
:::image type="content" source="media/how-to-application-insights/insights-process-agent-failures.png" alt-text="Screenshot of Azure portal Application Insights with Failures page showing." lightbox="media/how-to-application-insights/insights-process-agent-failures.png":::
61
61
62
-
* In the left navigation pane, select **Metrics** and select the namespace, you'll see both Spring Boot metrics and custom metrics, if any.
62
+
* In the left navigation pane, select **Metrics** and select the namespace to see both Spring Boot metrics and custom metrics, if any.
63
63
64
64
:::image type="content" source="media/how-to-application-insights/insights-process-agent-metrics.png" alt-text="Screenshot of Azure portal Application Insights with Metrics page showing." lightbox="media/how-to-application-insights/insights-process-agent-metrics.png":::
65
65
@@ -91,7 +91,7 @@ Enable the Java In-Process Agent by using the following procedure.
91
91
1. Select **Save** to save the change.
92
92
93
93
> [!NOTE]
94
-
> Do not use the same Application Insights instance in different Azure Spring Apps instances, or you'll see mixed data.
94
+
> Don't use the same Application Insights instance in different Azure Spring Apps instances, or you'll see mixed data.
95
95
96
96
::: zone-end
97
97
@@ -467,20 +467,20 @@ Automation in Enterprise tier is pending support. Documentation will be added as
467
467
468
468
::: zone pivot="sc-standard"
469
469
470
-
The Java agent will be updated/upgraded regularly with the JDK, which may affect the following scenarios.
470
+
The Java agent is updated/upgraded regularly with the JDK, which may affect the following scenarios.
471
471
472
472
> [!NOTE]
473
-
> The JDK version will be updated/upgraded quarterly per year.
473
+
> The JDK version is updated/upgraded quarterly per year.
474
474
475
-
* Existing applications that use the Java agent before updating/upgrading won't be affected.
476
-
* Applications created after updating/upgrading will use the new version of the Java agent.
477
-
* Existing applications that didn't previously use the Java agent will require restart or redeployment to use the new version of the Java agent.
475
+
* Existing applications that use the Java agent before updating/upgrading aren't affected.
476
+
* Applications created after updating/upgrading use the new version of the Java agent.
477
+
* Existing applications that didn't previously use the Java agent require restart or redeployment to use the new version of the Java agent.
478
478
479
479
::: zone-end
480
480
481
481
::: zone pivot="sc-enterprise"
482
482
483
-
The Java agent will be updated/upgraded when the buildpack is updated.
483
+
The Java agent is updated/upgraded when the buildpack is updated.
484
484
485
485
::: zone-end
486
486
@@ -495,7 +495,7 @@ Azure Spring Apps has enabled a hot-loading mechanism to adjust the settings of
495
495
496
496
* When the Java agent has been previously enabled, changes to the Application Insights instance and/or SamplingRate do NOT require applications to be restarted.
497
497
* If you enable the Java agent, then you must restart applications.
498
-
* When you disable the Java agent, applications will stop to send all monitoring data after a delay in minutes. You can restart applications to remove the agent from the Java runtime environment.
498
+
* When you disable the Java agent, applications stop sending all monitoring data after a delay in minutes. You can restart applications to remove the agent from the Java runtime environment.
499
499
500
500
::: zone-end
501
501
@@ -506,7 +506,7 @@ Azure Spring Apps has enabled a hot-loading mechanism to adjust the settings of
The name `App Instance` from Azure Spring Apps will be changed or generated in the following scenarios:
509
+
The name `App Instance` from Azure Spring Apps is changed or generated in the following scenarios:
510
510
511
511
* You create a new application.
512
512
* You deploy a JAR file or source code to an existing application.
@@ -516,11 +516,11 @@ The name `App Instance` from Azure Spring Apps will be changed or generated in t
516
516
517
517
When data is stored in Application Insights, it contains the history of Azure Spring Apps app instances created or deployed since the Java agent was enabled. For example, in the Application Insights portal, you can see application data created yesterday, but then deleted within a specific time range, like the last 24 hours. The following scenarios show how this works:
518
518
519
-
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. After some testing, you change the code and deploy a new JAR file to this application at 8:30 AM today. Then, you take a break, and when you come back around 11:00 AM, you check some data from Application Insights. You'll see:
519
+
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. After some testing, you change the code and deploy a new JAR file to this application at 8:30 AM today. Then, you take a break, and when you come back around 11:00 AM, you check some data from Application Insights. You see:
520
520
* Three instances in Application Map with time ranges in the last 24 hours, and Failures, Performance, and Metrics.
521
521
* One instance in Application Map with a time range in the last hour, and Failures, Performance, and Metrics.
522
522
* One instance in Live Metrics.
523
-
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. Around 8:30 AM today, you try a blue/green deployment with another JAR file. Currently, you have two deployments for this application. After a break around 11:00 AM today, you want to check some data from Application Insights. You'll see:
523
+
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. Around 8:30 AM today, you try a blue/green deployment with another JAR file. Currently, you have two deployments for this application. After a break around 11:00 AM today, you want to check some data from Application Insights. You see:
524
524
* Three instances in Application Map with time ranges in the last 24 hours, and Failures, Performance, and Metrics.
525
525
* Two instances in Application Map with time ranges in last hour, and Failures, Performance, and Metrics.
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-enable-system-assigned-managed-identity.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,7 @@ If you're unfamiliar with managed identities for Azure resources, see the [Manag
44
44
45
45
## Add a system-assigned identity
46
46
47
-
Creating an app with a system-assigned identity requires setting an additional property on the application.
47
+
Creating an app with a system-assigned identity requires setting another property on the application.
48
48
49
49
### [Portal](#tab/azure-portal)
50
50
@@ -91,17 +91,17 @@ az spring app identity assign \
91
91
92
92
An app can use its managed identity to get tokens to access other resources protected by Azure Active Directory, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
93
93
94
-
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
94
+
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
95
95
96
96
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. See [How to use VM token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md) for various code and script examples and guidance on important topics such as handling token expiration and HTTP errors.
97
97
98
98
## Disable system-assigned identity from an app
99
99
100
-
Removing a system-assigned identity will also delete it from Azure AD. Deleting the app resource automatically removes system-assigned identities from Azure AD.
100
+
Removing a system-assigned identity also deletes it from Azure AD. Deleting the app resource automatically removes system-assigned identities from Azure AD.
101
101
102
102
### [Portal](#tab/azure-portal)
103
103
104
-
To remove system-assigned managed identity from an app that no longer needs it:
104
+
Use the following steps to remove system-assigned managed identity from an app that no longer needs it:
105
105
106
106
1. Sign in to the portal using an account associated with the Azure subscription that contains the Azure Spring Apps instance.
107
107
1. Navigate to the desired application and select **Identity**.
Copy file name to clipboardExpand all lines: articles/spring-apps/how-to-manage-user-assigned-managed-identities.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ az spring app create \
57
57
58
58
## Assign user-assigned managed identities to an existing application
59
59
60
-
Assigning user-assigned managed identity requires setting an additional property on the application.
60
+
Assigning user-assigned managed identity requires setting another property on the application.
61
61
62
62
### [Azure portal](#tab/azure-portal)
63
63
@@ -87,13 +87,13 @@ az spring app identity assign \
87
87
88
88
An application can use its managed identity to get tokens to access other resources protected by Azure AD, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
89
89
90
-
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
90
+
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you've added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
91
91
92
-
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
92
+
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples, and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
93
93
94
94
## Remove user-assigned managed identities from an existing app
95
95
96
-
Removing user-assigned managed identities will remove the assignment between the identities and the application, and will not delete the identities themselves.
96
+
Removing user-assigned managed identities removes the assignment between the identities and the application, and doesn't delete the identities themselves.
0 commit comments