Skip to content

Commit c1becae

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-protected-actions-preview
2 parents f4b412c + 2bf0601 commit c1becae

File tree

8 files changed

+135
-49
lines changed

8 files changed

+135
-49
lines changed

.openpublishing.redirection.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22522,7 +22522,11 @@
2252222522
"source_path_from_root": "/articles/sentinel/data-connectors/microsoft-defender-threat-intelligence.md",
2252322523
"redirect_url": "/azure/sentinel/understand-threat-intelligence",
2252422524
"redirect_document_id": false
22525-
}
22526-
22525+
},
22526+
{
22527+
"source_path_from_root": "/articles/principles-for-ai-generated-content.md",
22528+
"redirect_url": "https://aka.ms/ai-content-principles",
22529+
"redirect_document_id": false
22530+
}
2252722531
]
2252822532
}
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
title: Performance Benchmark for forwarding Gateway using Azure Monitor Agent
3+
description: Performance data for the AMA running in a gateway scenario
4+
ms.topic: conceptual
5+
author: guywi-ms
6+
ms.author: guywild
7+
ms.date: 4/07/2023
8+
ms.reviewer: jeffwo
9+
10+
#customer-intent: As a deployment engineer, I can scope the resources required to scale my gateway data colletors the use the Azure Monitor Agent.
11+
12+
---
13+
# Azure Monitor Agent Performance Benchmark
14+
15+
The agent can handle many thousands of events per second in the gateway event forwarding scenario. The exact throughput rate depends on various factors such as the size of each event, the specific data type, and physical hardware resources. This article will describe the Microsoft internal benchmark used for testing the agent throughput of 10k Syslog events in the forwarder scenario. The benchmark results should provide a guide to size the resources that you will need in your environment.
16+
17+
> [!NOTE]
18+
> The results in this article are informational about the performance of AMA in the forwarding scenario only and do not constitute any service agreement on the part of Microsoft.
19+
20+
## Best practices for agent as a forwarder.
21+
22+
- The forwarder should be on a dedicated system to eliminate potential interference from other workloads.
23+
- The forwarder system should be monitored for CPU, memory, and disk utilization to prevent overloads from causing data loss.
24+
- Where possible use a load balancer and redundant forwarder systems to improve reliability and scalability.
25+
- For other considerations for forwarders see the Log Analytics Gateway documentation.
26+
27+
## Agent Performance
28+
29+
The benchmark is run in a controlled environment to get repeatable, accurate, and statistically significant results. The resources consumed by the agent are measured under a load of 10,000 simulated Syslog events per second. The simulated load is run on the same physical hardware that the agent under test is on. Test trials are run for seven days. For each trial, performance metrics are sampled every second to collect CPU, memory, and network maximum and average usage. This approach provides the right information to help you estimate the resources needed for your environment.
30+
31+
> [!NOTE]
32+
> The results do not measure the end-to-end throughput ingested by a Log Analytics Workspace (or other telemetry sinks), as there may be end-to-end variability due to network and backend pipeline performance.
33+
34+
The benchmarks are run on an Azure VM Standard_F8s_v2 system using AMA Linux version 1.25.2 and 10 GB of disk space for the event cache.
35+
36+
- vCPU’s: 8 with HyperThreading (800% CPU is possible)
37+
- Memory: 16 GiB
38+
- Temp Storage: 64 GiB
39+
- Max Disk IOPS: 6400
40+
- Network: 12500 Mbp Max on all 4 physical NICs
41+
42+
43+
44+
## Results
45+
46+
| Perf Metric | Ave (Max) Med |
47+
|:---|:---:|
48+
| CPU % | 51 (262) |
49+
| Mem RSS MB | 276 (1,017) |
50+
| Network KBps | 338 (18,033) |
51+
52+
53+
## Next steps
54+
55+
- [Connect computers without internet access by using the Log Analytics gateway in Azure Monitor](gateway.md)
56+
- [Install the Azure Monitor Agent](azure-monitor-agent-manage.md) on Windows and Linux virtual machines.
57+
- [Create a data collection rule](data-collection-rule-azure-monitor-agent.md) to collect data from the agent and send it to Azure Monitor.
58+

articles/azure-monitor/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,9 @@ items:
231231
href: agents/azure-monitor-agent-migration.md
232232
- name: Migration tools
233233
href: agents/azure-monitor-agent-migration-tools.md
234+
- name: Performance
235+
displayName: Performance
236+
href: /azure/azure-monitor/agents/azure-monitor-agent-performance.md
234237
- name: FAQ
235238
displayName: Azure Monitor agent FAQ
236239
href: /azure/azure-monitor/faq#azure-monitor-agent

articles/container-apps/ingress-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ HTTP ingress adds headers to pass metadata about the client request to your cont
6565
| `X-Forwarded-For` | The IP address of the client that sent the request. | |
6666
| `X-Forwarded-Host` | The host name the client used to connect with the Container Apps service. | |
6767

68-
### <a name="tcp"></a>TCP (preview)
68+
### <a name="tcp"></a>TCP
6969

7070
Container Apps supports TCP-based protocols other than HTTP or HTTPS. For example, you can use TCP ingress to expose a container app that uses the [Redis protocol](https://redis.io/topics/protocol).
7171

7272
> [!NOTE]
73-
> TCP ingress is in public preview.  External TCP ingress setting is only supported in Container Apps environments that use a [custom VNET](vnet-custom.md).
73+
> External TCP ingress is only supported for Container Apps environments that use a [custom VNET](vnet-custom.md).
7474
7575
With TCP ingress enabled, your container app:
7676

articles/principles-for-ai-generated-content.md

Lines changed: 0 additions & 45 deletions
This file was deleted.

articles/storage-mover/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,8 @@ items:
4141
expanded: true
4242
- name: Resources
4343
items:
44+
- name: Troubleshooting job run error codes
45+
href: status-code.md
4446
- name: Collect a support bundle
4547
href: troubleshooting.md
4648
- name: Release notes

articles/storage-mover/status-code.md

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
---
2+
title: Troubleshooting Azure Storage Mover job run error codes
3+
description: Learn how to understand and remediate errors raised by the Azure Storage Mover Agent.
4+
author: stevenmatthew
5+
ms.author: shaas
6+
ms.service: storage-mover
7+
ms.topic: how-to
8+
ms.date: 03/20/2023
9+
ms.custom: template-how-to
10+
---
11+
12+
<!--
13+
!########################################################
14+
STATUS: IN REVIEW
15+
16+
CONTENT: final
17+
18+
REVIEW Stephen/Fabian: completed
19+
REVIEW Engineering: not reviewed
20+
EDIT PASS: completed
21+
22+
Initial doc score: 79
23+
Current doc score: 100 (552, 0)
24+
25+
!########################################################
26+
-->
27+
28+
# Troubleshooting Storage Mover job run error codes
29+
30+
An Azure Storage Mover agent uses string status codes for statuses that are conveyed to the end user. All status codes have the prefix *AZSM* followed by four decimal digits. The first decimal digit indicates the high-level scope of the status. Each status code should belong to one of the following scopes:
31+
32+
- Status that applies to the entire agent.<br />These codes use the scope digit '0', and therefore and have the prefix "AZSM0".
33+
- Status that applies to a specific job run by the agent.<br />These codes use the scope digit '1' and therefore have the prefix "AZSM1".
34+
- Status that applies to a specific file or directory transferred by a job run by the agent.<br />These codes use the scope digit '2' and therefore have the prefix "AZSM2".
35+
36+
Each of these scopes further divides statuses into categories and subcategories. Each subcategory typically reserves 20 status codes to accommodate future expansion.
37+
38+
> [!TIP]
39+
> *AZSM0000* is the special scope-agnostic status code indicating successful operation. This should be used to signify successful operation at any scope/level.
40+
41+
|Error Code |Error Message | Details/Troubleshooting steps/Mitigation |
42+
|---------------------------------|--------------|------------------------------------------|
43+
| <a name="AZSM1001"></a>AZSM1001 |Failed to mount source path | Verify the provided server information, name or IP-address, is valid, or the source location is correct. |
44+
| <a name="AZSM1002"></a>AZSM1002 |Encountered an error while scanning the source | Retry or create a support ticket. |
45+
| <a name="AZSM1003"></a>AZSM1003 |Failed to access source folder due to permission issues | Check if the agent has been granted permissions correctly to the source file share. |
46+
| <a name="AZSM1004"></a>AZSM1004 |Source path provided is invalid | Create a new endpoint with a valid source share path and update the job definition and retry. |
47+
| <a name="AZSM1020"></a>AZSM1020 |Miscellaneous error while accessing source | Retry or create a support ticket. |
48+
| <a name="AZSM1021"></a>AZSM1021 |Failed to access target folder due to permission issues | Retry or create a support ticket. |
49+
| <a name="AZSM1022"></a>AZSM1022 |Target path provided is invalid | Create a new endpoint with a valid target container and path and update the job definition and retry. |
50+
| <a name="AZSM1023"></a>AZSM1023 |Lease expired for this agent on the target container | Retry or create a support ticket. |
51+
| <a name="AZSM1024"></a>AZSM1024 |Authorization failure on claiming the target container | The agent doesn't have the permission to access the target container. The role assignment is performed automatically while running jobs from the portal. If you're using the APIs/Powershell cmdlets/SDKs, then manually create a 'Storage Blob Data Contributor' role assignment for the agent to access the target storage account blob container. The [Assign an Azure role for access to blob data](/azure/storage/blobs/assign-azure-role-data-access) article may help resolve this issue. |
52+
| <a name="AZSM1025"></a>AZSM1025 |Authentication failure on claiming the target container | Retry or create a support ticket. |
53+
| <a name="AZSM1026"></a>AZSM1026 |Blob type in the target container not supported by the agent | This blob type is unsupported by the current Storage Mover agent. |
54+
| <a name="AZSM1040"></a>AZSM1040 |Miscellaneous error while accessing target | Retry or create a support ticket. |
55+
| <a name="AZSM1041"></a>AZSM1041 |Failed to send job progress | Retry or create a support ticket. |
56+
| <a name="AZSM1042"></a>AZSM1042 |Failed to create job | Retry or create a support ticket. |
57+
| <a name="AZSM1043"></a>AZSM1043 |Failed to resume job | Retry or create a support ticket. |
58+
| <a name="AZSM1044"></a>AZSM1044 |Failed to finalize the job | Retry or create a support ticket. |
59+
| <a name="AZSM1045"></a>AZSM1045 |Job was aborted while it was still running | Retry or create a support ticket. |
60+
| <a name="AZSM1060"></a>AZSM1060 |Miscellaneous error during job execution | Retry or create a support ticket. |

articles/virtual-desktop/troubleshoot-multimedia-redirection.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ The following issues are ones we're already aware of, so you won't need to repor
2828

2929
- You might run into issue where you are stuck in the loading state on every video site. This is a known issue that we're currently investigating. To temporarily mitigate this issue, sign out of Azure Virtual Desktop and restart your session.
3030

31+
- If you aren't using the default Windows size settings for video players, such as not fitting the player to window, not maximizing the window, and so on), parts of video players may not appear correctly. If you encounter this issue, you should change the settings back to Default mode.
32+
33+
- If your monitor or browser scale factor isn't set to 100%, you may see a gray pattern appear on the video screen.
34+
3135
### The MSI installer doesn't work
3236

3337
- There's a small chance that the MSI installer won't be able to install the extension during internal testing. If you run into this issue, you'll need to install the multimedia redirection extension from the Microsoft Edge Store or Google Chrome Store.

0 commit comments

Comments
 (0)