Skip to content

Commit b050e8e

Browse files
committed
Acrolinx fixes
1 parent bfb3666 commit b050e8e

File tree

3 files changed

+21
-21
lines changed

3 files changed

+21
-21
lines changed

articles/spring-apps/how-to-application-insights.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Application Insights can provide many observable perspectives, including:
4343

4444
When the **Application Insights** feature is enabled, you can:
4545

46-
* In the left navigation pane, select **Application Insights** to view the **Overview** page of Application Insights. The **Overview** page will show you an overview of all running applications.
46+
* In the left navigation pane, select **Application Insights** to view the **Overview** page of Application Insights. The **Overview** page shows you an overview of all running applications.
4747
* Select **Application Map** to see the status of calls between applications.
4848

4949
:::image type="content" source="media/how-to-application-insights/insights-process-agent-map.png" alt-text="Screenshot of Azure portal Application Insights with Application map page showing." lightbox="media/how-to-application-insights/insights-process-agent-map.png":::
@@ -59,7 +59,7 @@ When the **Application Insights** feature is enabled, you can:
5959

6060
:::image type="content" source="media/how-to-application-insights/insights-process-agent-failures.png" alt-text="Screenshot of Azure portal Application Insights with Failures page showing." lightbox="media/how-to-application-insights/insights-process-agent-failures.png":::
6161

62-
* In the left navigation pane, select **Metrics** and select the namespace, you'll see both Spring Boot metrics and custom metrics, if any.
62+
* In the left navigation pane, select **Metrics** and select the namespace to see both Spring Boot metrics and custom metrics, if any.
6363

6464
:::image type="content" source="media/how-to-application-insights/insights-process-agent-metrics.png" alt-text="Screenshot of Azure portal Application Insights with Metrics page showing." lightbox="media/how-to-application-insights/insights-process-agent-metrics.png":::
6565

@@ -91,7 +91,7 @@ Enable the Java In-Process Agent by using the following procedure.
9191
1. Select **Save** to save the change.
9292

9393
> [!NOTE]
94-
> Do not use the same Application Insights instance in different Azure Spring Apps instances, or you'll see mixed data.
94+
> Don't use the same Application Insights instance in different Azure Spring Apps instances, or you'll see mixed data.
9595
9696
::: zone-end
9797

@@ -467,20 +467,20 @@ Automation in Enterprise tier is pending support. Documentation will be added as
467467

468468
::: zone pivot="sc-standard"
469469

470-
The Java agent will be updated/upgraded regularly with the JDK, which may affect the following scenarios.
470+
The Java agent is updated/upgraded regularly with the JDK, which may affect the following scenarios.
471471

472472
> [!NOTE]
473-
> The JDK version will be updated/upgraded quarterly per year.
473+
> The JDK version is updated/upgraded quarterly per year.
474474
475-
* Existing applications that use the Java agent before updating/upgrading won't be affected.
476-
* Applications created after updating/upgrading will use the new version of the Java agent.
477-
* Existing applications that didn't previously use the Java agent will require restart or redeployment to use the new version of the Java agent.
475+
* Existing applications that use the Java agent before updating/upgrading aren't affected.
476+
* Applications created after updating/upgrading use the new version of the Java agent.
477+
* Existing applications that didn't previously use the Java agent require restart or redeployment to use the new version of the Java agent.
478478

479479
::: zone-end
480480

481481
::: zone pivot="sc-enterprise"
482482

483-
The Java agent will be updated/upgraded when the buildpack is updated.
483+
The Java agent is updated/upgraded when the buildpack is updated.
484484

485485
::: zone-end
486486

@@ -495,7 +495,7 @@ Azure Spring Apps has enabled a hot-loading mechanism to adjust the settings of
495495
496496
* When the Java agent has been previously enabled, changes to the Application Insights instance and/or SamplingRate do NOT require applications to be restarted.
497497
* If you enable the Java agent, then you must restart applications.
498-
* When you disable the Java agent, applications will stop to send all monitoring data after a delay in minutes. You can restart applications to remove the agent from the Java runtime environment.
498+
* When you disable the Java agent, applications stop sending all monitoring data after a delay in minutes. You can restart applications to remove the agent from the Java runtime environment.
499499

500500
::: zone-end
501501

@@ -506,7 +506,7 @@ Azure Spring Apps has enabled a hot-loading mechanism to adjust the settings of
506506
| `App` | * __Application Map__/Role<br />* __Live Metrics__/Role<br />* __Failures__/Roles/Cloud Role<br />* __Performance__/Roles/Could Role |
507507
| `App Instance` | * __Application Map__/Role Instance<br />* __Live Metrics__/Service Name<br />* __Failures__/Roles/Cloud Instance<br />* __Performance__/Roles/Could Instance |
508508

509-
The name `App Instance` from Azure Spring Apps will be changed or generated in the following scenarios:
509+
The name `App Instance` from Azure Spring Apps is changed or generated in the following scenarios:
510510

511511
* You create a new application.
512512
* You deploy a JAR file or source code to an existing application.
@@ -516,11 +516,11 @@ The name `App Instance` from Azure Spring Apps will be changed or generated in t
516516

517517
When data is stored in Application Insights, it contains the history of Azure Spring Apps app instances created or deployed since the Java agent was enabled. For example, in the Application Insights portal, you can see application data created yesterday, but then deleted within a specific time range, like the last 24 hours. The following scenarios show how this works:
518518

519-
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. After some testing, you change the code and deploy a new JAR file to this application at 8:30 AM today. Then, you take a break, and when you come back around 11:00 AM, you check some data from Application Insights. You'll see:
519+
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. After some testing, you change the code and deploy a new JAR file to this application at 8:30 AM today. Then, you take a break, and when you come back around 11:00 AM, you check some data from Application Insights. You see:
520520
* Three instances in Application Map with time ranges in the last 24 hours, and Failures, Performance, and Metrics.
521521
* One instance in Application Map with a time range in the last hour, and Failures, Performance, and Metrics.
522522
* One instance in Live Metrics.
523-
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. Around 8:30 AM today, you try a blue/green deployment with another JAR file. Currently, you have two deployments for this application. After a break around 11:00 AM today, you want to check some data from Application Insights. You'll see:
523+
* You created an application around 8:00 AM today from Azure Spring Apps with the Java agent enabled, and then you deployed a JAR file to this application around 8:10 AM today. Around 8:30 AM today, you try a blue/green deployment with another JAR file. Currently, you have two deployments for this application. After a break around 11:00 AM today, you want to check some data from Application Insights. You see:
524524
* Three instances in Application Map with time ranges in the last 24 hours, and Failures, Performance, and Metrics.
525525
* Two instances in Application Map with time ranges in last hour, and Failures, Performance, and Metrics.
526526
* Two instances in Live Metrics.

articles/spring-apps/how-to-enable-system-assigned-managed-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ If you're unfamiliar with managed identities for Azure resources, see the [Manag
4444

4545
## Add a system-assigned identity
4646

47-
Creating an app with a system-assigned identity requires setting an additional property on the application.
47+
Creating an app with a system-assigned identity requires setting another property on the application.
4848

4949
### [Portal](#tab/azure-portal)
5050

@@ -91,17 +91,17 @@ az spring app identity assign \
9191

9292
An app can use its managed identity to get tokens to access other resources protected by Azure Active Directory, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
9393

94-
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
94+
You may need to [configure the target resource to allow access from your application](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, make sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
9595

9696
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machine. We recommend using Java SDK or spring boot starters to acquire a token. See [How to use VM token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md) for various code and script examples and guidance on important topics such as handling token expiration and HTTP errors.
9797

9898
## Disable system-assigned identity from an app
9999

100-
Removing a system-assigned identity will also delete it from Azure AD. Deleting the app resource automatically removes system-assigned identities from Azure AD.
100+
Removing a system-assigned identity also deletes it from Azure AD. Deleting the app resource automatically removes system-assigned identities from Azure AD.
101101

102102
### [Portal](#tab/azure-portal)
103103

104-
To remove system-assigned managed identity from an app that no longer needs it:
104+
Use the following steps to remove system-assigned managed identity from an app that no longer needs it:
105105

106106
1. Sign in to the portal using an account associated with the Azure subscription that contains the Azure Spring Apps instance.
107107
1. Navigate to the desired application and select **Identity**.

articles/spring-apps/how-to-manage-user-assigned-managed-identities.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ az spring app create \
5757

5858
## Assign user-assigned managed identities to an existing application
5959

60-
Assigning user-assigned managed identity requires setting an additional property on the application.
60+
Assigning user-assigned managed identity requires setting another property on the application.
6161

6262
### [Azure portal](#tab/azure-portal)
6363

@@ -87,13 +87,13 @@ az spring app identity assign \
8787

8888
An application can use its managed identity to get tokens to access other resources protected by Azure AD, such as Azure Key Vault. These tokens represent the application accessing the resource, not any specific user of the application.
8989

90-
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you have added an access policy that includes your application's identity. Otherwise, your calls to Key Vault will be rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
90+
You may need to configure the target resource to allow access from your application. For more information, see [Assign a managed identity access to a resource by using the Azure portal](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). For example, if you request a token to access Key Vault, be sure you've added an access policy that includes your application's identity. Otherwise, your calls to Key Vault are rejected, even if they include the token. To learn more about which resources support Azure Active Directory tokens, see [Azure services that support Azure AD authentication](../active-directory/managed-identities-azure-resources/services-azure-active-directory-support.md)
9191

92-
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
92+
Azure Spring Apps shares the same endpoint for token acquisition with Azure Virtual Machines. We recommend using Java SDK or Spring Boot starters to acquire a token. For various code and script examples, and guidance on important topics such as handling token expiration and HTTP errors, see [How to use managed identities for Azure resources on an Azure VM to acquire an access token](../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md).
9393

9494
## Remove user-assigned managed identities from an existing app
9595

96-
Removing user-assigned managed identities will remove the assignment between the identities and the application, and will not delete the identities themselves.
96+
Removing user-assigned managed identities removes the assignment between the identities and the application, and doesn't delete the identities themselves.
9797

9898
### [Azure portal](#tab/azure-portal)
9999

0 commit comments

Comments
 (0)