Skip to content

Commit c13d91c

Browse files
authored
Merge pull request #222392 from MicrosoftDocs/main
12/26/2022 AM Publish
2 parents cb0a6e4 + b89e87a commit c13d91c

File tree

49 files changed

+565
-249
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+565
-249
lines changed

articles/aks/azure-disk-customer-managed-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ az account list-locations
4141
az group create -l myAzureRegionName -n myResourceGroup
4242
4343
# Create an Azure Key Vault resource in a supported Azure region
44-
az keyvault create -n myKeyVaultName -g myResourceGroup -l myAzureRegionName --enable-purge-protection true --enable-soft-delete true
44+
az keyvault create -n myKeyVaultName -g myResourceGroup -l myAzureRegionName --enable-purge-protection true
4545
```
4646

4747
## Create an instance of a DiskEncryptionSet

articles/azure-arc/vmware-vsphere/quick-start-connect-vcenter-to-arc-using-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ A typical onboarding that uses the script takes 30 to 60 minutes. During the pro
151151
After the command finishes running, your setup is complete. You can now use the capabilities of Azure Arc-enabled VMware vSphere.
152152
153153
> [!IMPORTANT]
154-
> After the successful installation of Azure Arc resource bridge, it is recommended to retain a copy of the resource bridge config .yaml files and the kubeconfig file safe and secure in a place that facilitates easy retrieval. These files may be needed later to run a few commands to perform management operations on the resource bridge.
154+
> After the successful installation of Azure Arc resource bridge, it is recommended to retain a copy of the resource bridge config .yaml files and the kubeconfig file safe and secure in a place that facilitates easy retrieval. These files may be needed later to run a few commands to perform management operations on the resource bridge. You can find the 3 .yaml files (config files) and the kubeconfig file in the same folder where you ran the script.
155155
156156
## Recovering from failed deployments
157157
Lines changed: 97 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,97 @@
1+
---
2+
title: Release notes - Map Control
3+
titleSuffix: Microsoft Azure Maps
4+
description: Release notes for the Azure Maps Web SDK.
5+
author: stevemunk
6+
ms.author: v-munksteve
7+
ms.date: 12/16/2022
8+
ms.topic: reference
9+
ms.service: azure-maps
10+
services: azure-maps
11+
---
12+
13+
# Web SDK map control release notes
14+
15+
This document contains information about new features and other changes to the Map Control.
16+
17+
## [3.0.0-preview.2](https://www.npmjs.com/package/azure-maps-control/v/3.0.0-preview.2) (December 16, 2022)
18+
19+
### New features
20+
21+
Add `progressiveLoading` and `progressiveLoadingInitialLayerGroups` to [StyleOptions][StyleOptions] to enable the capability of loading map layers progressively. This feature improves the perceived loading time of the map. For more information, see [2.2.2 release notes](#222-december-15-2022).
22+
23+
The preview is available on [npm](https://www.npmjs.com/package/azure-maps-control/v/3.0.0-preview.2) and CDN.
24+
25+
- Install [azure-maps-control@next][azure-maps-control] to your dependencies:
26+
```shell
27+
npm i azure-maps-control@next
28+
```
29+
30+
- Reference the following CSS and JavaScript in the `<head>` element of an HTML file:
31+
```html
32+
<link href="https://atlas.microsoft.com/sdk/javascript/mapcontrol/3.0.0-preview.2/atlas.min.css" rel="stylesheet" />
33+
<script src="https://atlas.microsoft.com/sdk/javascript/mapcontrol/3.0.0-preview.2/atlas.min.js"></script>
34+
```
35+
36+
### Bug fixes
37+
38+
- Fix an issue that the ordering of user layers wasn't preserved after calling `map.layers.move()`.
39+
40+
- Fix the inability to disable traffic incidents in [TrafficControlOptions][TrafficControlOptions] when `new atlas.control.TrafficControl({incidents: false})` is used.
41+
42+
- Add `.atlas-map` to all css selectors to scope the styles within the map container. The fix prevents the css from accidentally adding unwanted styles to other elements on the page.
43+
44+
## [3.0.0-preview.1](https://www.npmjs.com/package/azure-maps-control/v/3.0.0-preview.1) (November 18, 2022)
45+
46+
### New features
47+
48+
This update is the first preview of the upcoming 3.0.0 release. The underlying [maplibre-gl][maplibre-gl] dependency has been upgraded from `1.14` to `3.0.0-pre.1`, offering improvements in stability and performance. The preview is available on [npm](https://www.npmjs.com/package/azure-maps-control/v/3.0.0-preview.1).
49+
50+
- Install [azure-maps-control@next][azure-maps-control] to your dependencies:
51+
```shell
52+
npm i azure-maps-control@next
53+
```
54+
55+
### Bug fixes
56+
57+
- Fix a regression issue that prevents IndoorManager from removing a tileset by using
58+
```js
59+
indoorManager.setOptions({
60+
tilesetId: undefined
61+
})
62+
```
63+
64+
## [2.2.2](https://www.npmjs.com/package/azure-maps-control/v/2.2.2) (December 15, 2022)
65+
66+
### New features
67+
68+
Add `progressiveLoading` and `progressiveLoadingInitialLayerGroups` to [StyleOptions][StyleOptions] to enable the capability of loading map layers progressively. This feature improves the perceived loading time of the map.
69+
- `progressiveLoading`
70+
- Enables progressive loading of map layers.
71+
- Defaults to `false`.
72+
- `progressiveLoadingInitialLayerGroups`
73+
- Specifies the layer groups to load first.
74+
- Defaults to `["base"]`.
75+
- Possible values are `base`, `transit`, `labels`, `buildings`, and `labels_places`.
76+
- Other layer groups are deferred such that the initial layer groups can be loaded first.
77+
78+
### Bug fixes
79+
80+
- Fix an issue that the ordering of user layers wasn't preserved after calling `map.layers.move()`.
81+
82+
- Fix the inability to disable traffic incidents in [TrafficControlOptions][TrafficControlOptions] when `new atlas.control.TrafficControl({incidents: false})` is used.
83+
84+
## Next steps
85+
86+
Explore samples showcasing Azure Maps:
87+
88+
[Azure Maps Samples](https://samples.azuremaps.com)
89+
90+
Stay up to date on Azure Maps:
91+
92+
[Azure Maps Blog](https://techcommunity.microsoft.com/t5/azure-maps-blog/bg-p/AzureMapsBlog)
93+
94+
[azure-maps-control]: https://www.npmjs.com/package/azure-maps-control
95+
[maplibre-gl]: https://www.npmjs.com/package/maplibre-gl
96+
[StyleOptions]: /javascript/api/azure-maps-control/atlas.styleoptions
97+
[TrafficControlOptions]: /javascript/api/azure-maps-control/atlas.trafficcontroloptions

articles/azure-maps/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -467,6 +467,10 @@ items:
467467
href: /javascript/api/azure-maps-spatial-io/
468468
- name: Indoor module
469469
href: /javascript/api/azure-maps-indoor/
470+
- name: Release notes
471+
items:
472+
- name: Map control
473+
href: release-notes-map-control.md
470474
- name: Resource Manager template
471475
href: /azure/templates/microsoft.maps/accounts
472476
- name: Azure CLI

articles/azure-monitor/alerts/alerts-dynamic-thresholds.md

Lines changed: 118 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -97,13 +97,129 @@ If you have a new resource or missing metric data, Dynamic Thresholds won't trig
9797

9898
The system automatically recognizes prolonged outages and removes them from the threshold learning algorithm. As a result, despite prolonged outages, dynamic thresholds understand the data. Service issues are detected with the same sensitivity as before an outage occurred.
9999

100+
## The Dynamic Thresholds borders don't seem to fit the data
101+
102+
If the behavior of a metric changed recently, the changes won't necessarily be reflected in the Dynamic Threshold borders (upper and lower bounds) immediately. The borders are calculated based on metric data from the last 10 days. When you view the Dynamic Threshold borders for a given metric, look at the metric trend in the last week and not only for recent hours or days.
103+
104+
## Why is weekly seasonality not detected by Dynamic Thresholds?
105+
106+
To identify weekly seasonality, the Dynamic Thresholds model requires at least three weeks of historical data. When enough historical data is available, any weekly seasonality that exists in the metric data is identified and the model is adjusted accordingly.
107+
108+
## Dynamic Thresholds shows a negative lower bound for a metric even though the metric always has positive values
109+
110+
When a metric exhibits large fluctuation, Dynamic Thresholds builds a wider model around the metric values. This action can result in the lower border being below zero. Specifically, this scenario can happen when:
111+
112+
- The sensitivity is set to low.
113+
- The median values are close to zero.
114+
- The metric exhibits an irregular behavior with high variance, which appears as spikes or dips in the data.
115+
116+
When the lower bound has a negative value, it's plausible for the metric to reach a zero value given the metric's irregular behavior. Consider choosing a higher sensitivity or a larger **Aggregation granularity (Period)** to make the model less sensitive. Or, use the **Ignore data before** option to exclude a recent irregularity from the historical data used to build the model.
117+
118+
## The Dynamic Thresholds alert rule is too noisy or fires too much
119+
120+
To reduce the sensitivity of your Dynamic Thresholds alert rule, use one of the following options:
121+
122+
- **Threshold sensitivity:** Set the sensitivity to **Low** to be more tolerant for deviations.
123+
- **Number of violations (under Advanced settings):** Configure the alert rule to trigger only if several deviations occur within a certain period of time. This setting makes the rule less susceptible to transient deviations.
124+
125+
## The Dynamic Thresholds alert rule doesn't fire or is not sensitive enough
126+
127+
Sometimes an alert rule won't trigger, even when a high sensitivity is configured. This scenario usually happens when the metric's distribution is highly irregular.
128+
Consider one of the following options:
129+
130+
* Move to monitoring a complementary metric that's suitable for your scenario, if applicable. For example, check for changes in success rate rather than failure rate.
131+
* Try selecting a different value for **Aggregation granularity (Period)**.
132+
* Check if there was a drastic change in the metric behavior in the last 10 days, for example, an outage. An abrupt change can affect the upper and lower thresholds calculated for the metric and make them broader. Wait for a few days until the outage is no longer taken into the thresholds calculation. Or use the **Ignore data before** option under **Advanced settings**.
133+
* If your data has weekly seasonality, but not enough history is available for the metric, the calculated thresholds can result in having broad upper and lower bounds. For example, the calculation can treat weekdays and weekends in the same way and build wide borders that don't always fit the data. This issue should resolve itself after enough metric history is available. Then, the correct seasonality will be detected and the calculated thresholds will update accordingly.
134+
135+
## Metrics not supported by Dynamic Thresholds
136+
137+
Dynamic thresholds are supported for most metrics, but some metrics can't use dynamic thresholds.
138+
139+
The following table lists the metrics that aren't supported by Dynamic Thresholds.
140+
141+
| Resource type | Metric name |
142+
| --- | --- |
143+
| Microsoft.ClassicStorage/storageAccounts | UsedCapacity |
144+
| Microsoft.ClassicStorage/storageAccounts/blobServices | BlobCapacity |
145+
| Microsoft.ClassicStorage/storageAccounts/blobServices | BlobCount |
146+
| Microsoft.ClassicStorage/storageAccounts/blobServices | IndexCapacity |
147+
| Microsoft.ClassicStorage/storageAccounts/fileServices | FileCapacity |
148+
| Microsoft.ClassicStorage/storageAccounts/fileServices | FileCount |
149+
| Microsoft.ClassicStorage/storageAccounts/fileServices | FileShareCount |
150+
| Microsoft.ClassicStorage/storageAccounts/fileServices | FileShareSnapshotCount |
151+
| Microsoft.ClassicStorage/storageAccounts/fileServices | FileShareSnapshotSize |
152+
| Microsoft.ClassicStorage/storageAccounts/fileServices | FileShareQuota |
153+
| Microsoft.Compute/disks | Composite Disk Read Bytes/sec |
154+
| Microsoft.Compute/disks | Composite Disk Read Operations/sec |
155+
| Microsoft.Compute/disks | Composite Disk Write Bytes/sec |
156+
| Microsoft.Compute/disks | Composite Disk Write Operations/sec |
157+
| Microsoft.ContainerService/managedClusters | NodesCount |
158+
| Microsoft.ContainerService/managedClusters | PodCount |
159+
| Microsoft.ContainerService/managedClusters | CompletedJobsCount |
160+
| Microsoft.ContainerService/managedClusters | RestartingContainerCount |
161+
| Microsoft.ContainerService/managedClusters | OomKilledContainerCount |
162+
| Microsoft.Devices/IotHubs | TotalDeviceCount |
163+
| Microsoft.Devices/IotHubs | ConnectedDeviceCount |
164+
| Microsoft.Devices/IotHubs | TotalDeviceCount |
165+
| Microsoft.Devices/IotHubs | ConnectedDeviceCount |
166+
| Microsoft.DocumentDB/databaseAccounts | CassandraConnectionClosures |
167+
| Microsoft.EventHub/clusters | Size |
168+
| Microsoft.EventHub/namespaces | Size |
169+
| Microsoft.IoTCentral/IoTApps | connectedDeviceCount |
170+
| Microsoft.IoTCentral/IoTApps | provisionedDeviceCount |
171+
| Microsoft.Kubernetes/connectedClusters | NodesCount |
172+
| Microsoft.Kubernetes/connectedClusters | PodCount |
173+
| Microsoft.Kubernetes/connectedClusters | CompletedJobsCount |
174+
| Microsoft.Kubernetes/connectedClusters | RestartingContainerCount |
175+
| Microsoft.Kubernetes/connectedClusters | OomKilledContainerCount |
176+
| Microsoft.MachineLearningServices/workspaces/onlineEndpoints | RequestsPerMinute |
177+
| Microsoft.MachineLearningServices/workspaces/onlineEndpoints/deployments | DeploymentCapacity |
178+
| Microsoft.Maps/accounts | CreatorUsage |
179+
| Microsoft.Media/mediaservices/streamingEndpoints | EgressBandwidth |
180+
| Microsoft.Network/applicationGateways | Throughput |
181+
| Microsoft.Network/azureFirewalls | Throughput |
182+
| Microsoft.Network/expressRouteGateways | ExpressRouteGatewayPacketsPerSecond |
183+
| Microsoft.Network/expressRouteGateways | ExpressRouteGatewayNumberOfVmInVnet |
184+
| Microsoft.Network/expressRouteGateways | ExpressRouteGatewayFrequencyOfRoutesChanged |
185+
| Microsoft.Network/virtualNetworkGateways | ExpressRouteGatewayBitsPerSecond |
186+
| Microsoft.Network/virtualNetworkGateways | ExpressRouteGatewayPacketsPerSecond |
187+
| Microsoft.Network/virtualNetworkGateways | ExpressRouteGatewayNumberOfVmInVnet |
188+
| Microsoft.Network/virtualNetworkGateways | ExpressRouteGatewayFrequencyOfRoutesChanged |
189+
| Microsoft.ServiceBus/namespaces | Size |
190+
| Microsoft.ServiceBus/namespaces | Messages |
191+
| Microsoft.ServiceBus/namespaces | ActiveMessages |
192+
| Microsoft.ServiceBus/namespaces | DeadletteredMessages |
193+
| Microsoft.ServiceBus/namespaces | ScheduledMessages |
194+
| Microsoft.ServiceFabricMesh/applications | AllocatedCpu |
195+
| Microsoft.ServiceFabricMesh/applications | AllocatedMemory |
196+
| Microsoft.ServiceFabricMesh/applications | ActualCpu |
197+
| Microsoft.ServiceFabricMesh/applications | ActualMemory |
198+
| Microsoft.ServiceFabricMesh/applications | ApplicationStatus |
199+
| Microsoft.ServiceFabricMesh/applications | ServiceStatus |
200+
| Microsoft.ServiceFabricMesh/applications | ServiceReplicaStatus |
201+
| Microsoft.ServiceFabricMesh/applications | ContainerStatus |
202+
| Microsoft.ServiceFabricMesh/applications | RestartCount |
203+
| Microsoft.Storage/storageAccounts | UsedCapacity |
204+
| Microsoft.Storage/storageAccounts/blobServices | BlobCapacity |
205+
| Microsoft.Storage/storageAccounts/blobServices | BlobCount |
206+
| Microsoft.Storage/storageAccounts/blobServices | BlobProvisionedSize |
207+
| Microsoft.Storage/storageAccounts/blobServices | IndexCapacity |
208+
| Microsoft.Storage/storageAccounts/fileServices | FileCapacity |
209+
| Microsoft.Storage/storageAccounts/fileServices | FileCount |
210+
| Microsoft.Storage/storageAccounts/fileServices | FileShareCount |
211+
| Microsoft.Storage/storageAccounts/fileServices | FileShareSnapshotCount |
212+
| Microsoft.Storage/storageAccounts/fileServices | FileShareSnapshotSize |
213+
| Microsoft.Storage/storageAccounts/fileServices | FileShareCapacityQuota |
214+
| Microsoft.Storage/storageAccounts/fileServices | FileShareProvisionedIOPS |
215+
100216
## Dynamic Thresholds best practices
101217

102218
Dynamic Thresholds can be applied to most platform and custom metrics in Azure Monitor, and it was also tuned for the common application and infrastructure metrics.
103219

104220
The following items are best practices on how to configure alerts on some of these metrics by using Dynamic Thresholds.
105221

106-
### Configure dynamic thresholds on virtual machine CPU percentage metrics
222+
## Configure dynamic thresholds on virtual machine CPU percentage metrics
107223

108224
1. In the [Azure portal](https://portal.azure.com), select **Monitor**. The **Monitor** view consolidates all your monitoring settings and data in one view.
109225

@@ -140,7 +256,7 @@ The following items are best practices on how to configure alerts on some of the
140256
> [!NOTE]
141257
> Metric alert rules created through the portal are created in the same resource group as the target resource.
142258
143-
### Configure dynamic thresholds on Application Insights HTTP request execution time
259+
## Configure dynamic thresholds on Application Insights HTTP request execution time
144260

145261
1. In the [Azure portal](https://portal.azure.com), select **Monitor**. The **Monitor** view consolidates all your monitoring settings and data in one view.
146262

articles/azure-monitor/alerts/alerts-manage-alert-instances.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,4 +37,5 @@ The **alerts details** page provides details about the selected alert.
3737
## Next steps
3838

3939
- [Learn about Azure Monitor alerts](./alerts-overview.md)
40-
- [Create a new alert rule](alerts-log.md)
40+
- [Create a new alert rule](alerts-log.md)
41+
- [Manage your alerts programmatically](alerts-overview.md#manage-your-alerts-programmatically)

0 commit comments

Comments
 (0)