Skip to content

Commit c63e503

Browse files
authored
Merge pull request #80925 from MicrosoftDocs/master
6/28 AM Publish
2 parents aa66898 + ad1c727 commit c63e503

File tree

65 files changed

+746
-221
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+746
-221
lines changed

articles/active-directory/develop/registration-config-sso-how-to.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to configure a new multi-tenant application | Microsoft Docs
2+
title: How to configure single sign-on | Microsoft Docs
33
description: How to configure single sign-on for a custom application you are developing and registering with Azure AD.
44
services: active-directory
55
documentationcenter: ''
@@ -19,7 +19,7 @@ ms.author: ryanwi
1919
ms.collection: M365-identity-device-management
2020
---
2121

22-
# How to configure a new multi-tenant application
22+
# How to configure single sign-on for an application
2323

2424
Enabling federated single sign-on (SSO) in your app is automatically enabled when federating through Azure AD for OpenID Connect, SAML 2.0, or WS-Fed. If your end users are having to sign in despite already having an existing session with Azure AD, it’s likely your app may be misconfigured.
2525

articles/aks/istio-install.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,8 @@ In PowerShell, use `Invoke-WebRequest` to download the latest Istio release and
7979
$ISTIO_VERSION="1.1.3"
8080
8181
# Windows
82+
# Use TLS 1.2
83+
[Net.ServicePointManager]::SecurityProtocol = "tls12"
8284
$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest -URI "https://github.com/istio/istio/releases/download/$ISTIO_VERSION/istio-$ISTIO_VERSION-win.zip" -OutFile "istio-$ISTIO_VERSION.zip"
8385
Expand-Archive -Path "istio-$ISTIO_VERSION.zip" -DestinationPath .
8486
```
@@ -566,4 +568,4 @@ To learn how to monitor your AKS application using Application Insights and Isti
566568
<!-- LINKS - internal -->
567569
[aks-quickstart]: ./kubernetes-walkthrough.md
568570
[istio-scenario-routing]: ./istio-scenario-routing.md
569-
[helm-install]: ./kubernetes-helm.md
571+
[helm-install]: ./kubernetes-helm.md

articles/azure-databricks/databricks-extract-load-sql-data-warehouse.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ If you don’t have an Azure subscription, create a [free account](https://azure
3535

3636
> [!Note]
3737
> This tutorial cannot be carried out using **Azure Free Trial Subscription**.
38-
> If you have a free account, go to your profile and change your subscription to **pay-as-you-go**. For more information, see [Azure free account](https://azure.microsoft.com/free/). Then, [remove the spending limit](https://docs.microsoft.com/en-us/azure/billing/billing-spending-limit#remove-the-spending-limit-in-account-center), and [request a quota increase](https://docs.microsoft.com/en-us/azure/azure-supportability/resource-manager-core-quotas-request) for vCPUs in your region. When you create your Azure Databricks workspace, you can select the **Trial (Premium - 14-Days Free DBUs)** pricing tier to give the workspace access to free Premium Azure Databricks DBUs for 14 days.
38+
> If you have a free account, go to your profile and change your subscription to **pay-as-you-go**. For more information, see [Azure free account](https://azure.microsoft.com/free/). Then, [remove the spending limit](https://docs.microsoft.com/azure/billing/billing-spending-limit#remove-the-spending-limit-in-account-center), and [request a quota increase](https://docs.microsoft.com/azure/azure-supportability/resource-manager-core-quotas-request) for vCPUs in your region. When you create your Azure Databricks workspace, you can select the **Trial (Premium - 14-Days Free DBUs)** pricing tier to give the workspace access to free Premium Azure Databricks DBUs for 14 days.
3939
4040
## Prerequisites
4141

articles/azure-monitor/app/proactive-diagnostics.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.date: 02/07/2019
1414
ms.author: mbullwin
1515
---
1616
# Smart Detection in Application Insights
17-
Smart Detection automatically warns you of potential performance problems in your web application. It performs proactive analysis of the telemetry that your app sends to [Application Insights](../../azure-monitor/app/app-insights-overview.md). If there is a sudden rise in failure rates, or abnormal patterns in client or server performance, you get an alert. This feature needs no configuration. It operates if your application sends enough telemetry.
17+
Smart Detection automatically warns you of potential performance problems and failure anomalies in your web application. It performs proactive analysis of the telemetry that your app sends to [Application Insights](../../azure-monitor/app/app-insights-overview.md). If there is a sudden rise in failure rates, or abnormal patterns in client or server performance, you get an alert. This feature needs no configuration. It operates if your application sends enough telemetry.
1818

19-
You can access Smart Detection alerts both from the emails you receive, and from the Smart Detection blade.
19+
You can access the detections issued by Smart Detection both from the emails you receive, and from the Smart Detection blade.
2020

2121
## Review your Smart Detections
2222
You can discover detections in two ways:
@@ -26,24 +26,24 @@ You can discover detections in two ways:
2626
![Email alert](./media/proactive-diagnostics/03.png)
2727

2828
Click the big button to open more detail in the portal.
29-
* **The Smart Detection tile** on your app's overview blade shows a count of recent alerts. Click the tile to see a list of recent alerts.
29+
* **The Smart Detection blade** in Application Insights. Select **Smart Detection** under the **Investigate** menu to see a list of recent detections.
3030

3131
![View recent detections](./media/proactive-diagnostics/04.png)
3232

33-
Select an alert to see its details.
33+
Select a detection to see its details.
3434

3535
## What problems are detected?
36-
There are three kinds of detection:
36+
Smart Detection detects and notifies about a variety of issues, such as:
3737

3838
* [Smart detection - Failure Anomalies](../../azure-monitor/app/proactive-failure-diagnostics.md). We use machine learning to set the expected rate of failed requests for your app, correlating with load and other factors. If the failure rate goes outside the expected envelope, we send an alert.
3939
* [Smart detection - Performance Anomalies](../../azure-monitor/app/proactive-performance-diagnostics.md). You get notifications if response time of an operation or dependency duration is slowing down compared to historical baseline or if we identify an anomalous pattern in response time or page load time.
40-
* [Smart detection - Azure Cloud Service issues](https://azure.microsoft.com/blog/proactive-notifications-on-cloud-service-issues-with-azure-diagnostics-and-application-insights/). You get alerts if your app is hosted in Azure Cloud Services and a role instance has startup failures, frequent recycling, or runtime crashes.
40+
* General degradations and issues, like [Trace degredation](https://docs.microsoft.com/azure/azure-monitor/app/proactive-trace-severity), [Memory leak](https://docs.microsoft.com/azure/azure-monitor/app/proactive-potential-memory-leak), [Abnormal rise in Exception volume](https://docs.microsoft.com/azure/azure-monitor/app/proactive-exception-volume) and [Security anti-patterns](https://docs.microsoft.com/azure/azure-monitor/app/proactive-application-security-detection-pack).
4141

4242
(The help links in each notification take you to the relevant articles.)
4343

4444
## Smart Detection email notifications
4545

46-
All Smart Detection rules, except for rules marked as Preview, are configured by default to send email notifications when detections are found.
46+
All Smart Detection rules, except for rules marked as _preview_, are configured by default to send email notifications when detections are found.
4747

4848
Configuring email notifications for a specific Smart Detection rule can be done by opening the Smart Detection **Settings** blade and selecting the rule, which will open the **Edit rule** blade.
4949

articles/azure-monitor/app/proactive-failure-diagnostics.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.author: mbullwin
1717
# Smart Detection - Failure Anomalies
1818
[Application Insights](../../azure-monitor/app/app-insights-overview.md) automatically notifies you in near real time if your web app experiences an abnormal rise in the rate of failed requests. It detects an unusual rise in the rate of HTTP requests or dependency calls that are reported as failed. For requests, failed requests are usually those with response codes of 400 or higher. To help you triage and diagnose the problem, an analysis of the characteristics of the failures and related telemetry is provided in the notification. There are also links to the Application Insights portal for further diagnosis. The feature needs no set-up nor configuration, as it uses machine learning algorithms to predict the normal failure rate.
1919

20-
This feature works for Java and ASP.NET web apps, hosted in the cloud or on your own servers. It also works for any app that generates request or dependency telemetry - for example, if you have a worker role that calls [TrackRequest()](../../azure-monitor/app/api-custom-events-metrics.md#trackrequest) or [TrackDependency()](../../azure-monitor/app/api-custom-events-metrics.md#trackdependency).
20+
This feature works for any web app, hosted in the cloud or on your own servers, that generates request or dependency telemetry - for example, if you have a worker role that calls [TrackRequest()](../../azure-monitor/app/api-custom-events-metrics.md#trackrequest) or [TrackDependency()](../../azure-monitor/app/api-custom-events-metrics.md#trackdependency).
2121

2222
After setting up [Application Insights for your project](../../azure-monitor/app/app-insights-overview.md), and provided your app generates a certain minimum amount of telemetry, Smart Detection of failure anomalies takes 24 hours to learn the normal behavior of your app, before it is switched on and can send alerts.
2323

@@ -38,6 +38,26 @@ Notice that it tells you:
3838
* The exception, log traces, and dependency failure (databases or other external components) that appear to be associated with the characterized failures.
3939
* Links directly to relevant searches on the telemetry in Application Insights.
4040

41+
## Failure Anomalies v2
42+
A new version of the Failure Anomalies alert rule is now available. This new version is running on the new Azure alerting platform and introduces a variety of improvements over the existing version.
43+
44+
### What's new in this version?
45+
- Faster detection of issues
46+
- A richer set of actions - The alert rule is created with an associated [Action Group](https://docs.microsoft.com/azure/azure-monitor/platform/action-groups) named "Application Insights Smart Detection" that contains email and webhook actions, and can be extended to trigger additional actions when the alert fires.
47+
- More focused notifications - Email notifications sent from this alert rule are now sent by default to users associated with the subscription's Monitoring Reader and Monitoring Contributor roles. More information on this is available [here](https://docs.microsoft.com/azure/azure-monitor/app/proactive-email-notification).
48+
- Easier configuration via ARM templates - See example [here](https://docs.microsoft.com/azure/azure-monitor/app/proactive-arm-config).
49+
- Common alert schema support - Notifications sent from this alert rule follow the [common alert schema](https://docs.microsoft.com/azure/azure-monitor/platform/alerts-common-schema).
50+
- Unified email template - Email notifications from this alert rule have a consistent look & feel with other alert types. With this change, the option to get Failure Anomalies alerts with detailed diagnostics information is no longer available.
51+
52+
### How do I get the new version?
53+
- Newly created Application Insights resources are now provisioned with the new version of the Failure Anomalies alert rule.
54+
- Existing Application Insights resources with the classic version of the Failure Anomalies alert rule will get the new version once their hosting subscription is migrated to the new alerting platform as part of the [classic alerts retirement process](https://docs.microsoft.com/azure/azure-monitor/platform/monitoring-classic-retirement).
55+
56+
> [!NOTE]
57+
> The new version of the Failure Anomalies alert rule remains free. In addition, email and webhook actions triggered by the associated "Application Insights Smart Detection" Action Group are free as well.
58+
>
59+
>
60+
4161
## Benefits of Smart Detection
4262
Ordinary [metric alerts](../../azure-monitor/app/alerts.md) tell you there might be a problem. But Smart Detection starts the diagnostic work for you, performing a lot of the analysis you would otherwise have to do yourself. You get the results neatly packaged, helping you to get quickly to the root of the problem.
4363

articles/azure-monitor/insights/vminsights-enable-overview.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: azure-monitor
1111
ms.topic: conceptual
1212
ms.tgt_pltfrm: na
1313
ms.workload: infrastructure-services
14-
ms.date: 06/19/2019
14+
ms.date: 06/28/2019
1515
ms.author: magoedte
1616
---
1717

@@ -81,7 +81,7 @@ The following table lists the Windows and Linux operating systems that Azure Mon
8181
|Red Hat Enterprise Linux (RHEL) 6, 7| X | X| X |
8282
|Ubuntu 14.04, 16.04, 18.04 | X | X | X |
8383
|CentOS Linux 6, 7 | X | X | X |
84-
|SUSE Linux Enterprise Server (SLES) 11, 12 | X | X | X |
84+
|SUSE Linux Enterprise Server (SLES) 12 | X | X | X |
8585
|Debian 8, 9.4 | X<sup>1</sup> | | X |
8686

8787
<sup>1</sup> The Performance feature of Azure Monitor for VMs is available only from Azure Monitor. It isn't available directly from the left pane of the Azure VM.
@@ -127,18 +127,14 @@ The following table lists the Windows and Linux operating systems that Azure Mon
127127
| 16.04 | 4.4.\*<br>4.8.\*<br>4.10.\*<br>4.11.\*<br>4.13.\* |
128128
| 14.04 | 3.13.\*<br>4.4.\* |
129129

130-
#### SUSE Linux 11 Enterprise Server
131-
132-
| OS version | Kernel version
133-
|:--|:--|
134-
|11 SP4 | 3.0.* |
135-
136130
#### SUSE Linux 12 Enterprise Server
137131

138132
| OS version | Kernel version
139133
|:--|:--|
140134
|12 SP2 | 4.4.* |
141135
|12 SP3 | 4.4.* |
136+
|12 SP4 | 4.4.* |
137+
|12 SP4 | Azure-Tuned Kernel |
142138

143139
### The Microsoft Dependency agent
144140

articles/azure-monitor/log-query/unify-app-resource-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ The following table shows the schema differences between Log Analytics and Appli
136136
| SessionId | session_Id |
137137
| SourceSystem | operation_SyntheticSource |
138138
| TelemetryTYpe | type |
139-
| URL | _url |
139+
| URL | url |
140140
| UserAccountId | user_AccountId |
141141

142142
## Next steps

articles/azure-monitor/platform/manage-cost-storage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -101,11 +101,11 @@ The following steps describe how to configure how long log data is kept by in yo
101101

102102
![Change workspace data retention setting](media/manage-cost-storage/manage-cost-change-retention-01.png)
103103

104-
The retention can also be [set via ARM](https://docs.microsoft.com/en-us/azure/azure-monitor/platform/template-workspace-configuration#configure-a-log-analytics-workspace) using the `dataRetention` parameter. Additionally, if you set the data retention to 30 days, you can trigger an immediate purge of older data using the `immediatePurgeDataOn30Days` parameter, which may be useful for compliance-related scenarios. This functionality is only exposed via ARM.
104+
The retention can also be [set via ARM](https://docs.microsoft.com/azure/azure-monitor/platform/template-workspace-configuration#configure-a-log-analytics-workspace) using the `dataRetention` parameter. Additionally, if you set the data retention to 30 days, you can trigger an immediate purge of older data using the `immediatePurgeDataOn30Days` parameter, which may be useful for compliance-related scenarios. This functionality is only exposed via ARM.
105105

106106
## Legacy pricing tiers
107107

108-
Subscriptions who had a Log Analytics workspace or Application Insights resource in it before April 2, 2018, or are linked to an Enterprise Agreement that started prior to February 1, 2019, will continue to have access to the legacy pricing tiers: **Free**, **Standalone (Per GB)** and **Per Node (OMS)**. Workspaces in the Free pricing tier will have daily data ingestion limited to 500 MB (except for security data types collected by Azure Security Center) and the data retention is limited to 7 days. The Free pricing tier is intended only for evaluation purposes. Workspaces in the Standalone or Per Node pricing tiers have user-configurable retention of up to 2 years. Workspaces created prior to April 2016 also have access the original **Standard** and **Premium** pricing tiers. More details of pricing tier limitations are available [here](https://docs.microsoft.com/en-us/azure/azure-subscription-service-limits#log-analytics-workspaces).
108+
Subscriptions who had a Log Analytics workspace or Application Insights resource in it before April 2, 2018, or are linked to an Enterprise Agreement that started prior to February 1, 2019, will continue to have access to the legacy pricing tiers: **Free**, **Standalone (Per GB)** and **Per Node (OMS)**. Workspaces in the Free pricing tier will have daily data ingestion limited to 500 MB (except for security data types collected by Azure Security Center) and the data retention is limited to 7 days. The Free pricing tier is intended only for evaluation purposes. Workspaces in the Standalone or Per Node pricing tiers have user-configurable retention of up to 2 years. Workspaces created prior to April 2016 also have access the original **Standard** and **Premium** pricing tiers. More details of pricing tier limitations are available [here](https://docs.microsoft.com/azure/azure-subscription-service-limits#log-analytics-workspaces).
109109

110110
> [!NOTE]
111111
> To use the entitlements that come from purchasing OMS E1 Suite, OMS E2 Suite or OMS Add-On for System Center, choose the Log Analytics *Per Node* pricing tier.
@@ -123,7 +123,7 @@ If your Log Analytics workspace has access to legacy pricing tiers, to change be
123123
3. Under **Pricing tier**, select a pricing tier and then click **Select**.
124124
![Selected pricing plan](media/manage-cost-storage/workspace-pricing-tier-info.png)
125125

126-
You can also [set the pricing tier via ARM](https://docs.microsoft.com/en-us/azure/azure-monitor/platform/template-workspace-configuration#configure-a-log-analytics-workspace) using the `ServiceTier` parameter.
126+
You can also [set the pricing tier via ARM](https://docs.microsoft.com/azure/azure-monitor/platform/template-workspace-configuration#configure-a-log-analytics-workspace) using the `ServiceTier` parameter.
127127

128128
## Troubleshooting why Log Analytics is no longer collecting data
129129

articles/cognitive-services/QnAMaker/How-To/troubleshooting-runtime.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,8 @@ ms.custom: seodec18
1717
QnAMaker comprises of components hosted in the user's Azure account. Debugging may require users to manipulate their QnAMaker Azure resources or provide QnAMaker support team with additional information about their setup.
1818

1919
## How to get latest QnAMaker runtime updates
20-
QnAMaker runtime is part of the Azure App Service deployed when you [create a QnAMaker service](./set-up-qnamaker-service-azure.md) in Azure portal. Updates are made periodically to the runtime. To apply the latest updates to apply to your QnAMaker setup, you must restart the App Service.
20+
QnAMaker runtime is part of the Azure App Service deployed when you [create a QnAMaker service](./set-up-qnamaker-service-azure.md) in Azure portal. Updates are made periodically to the runtime. QnA Maker App Service is on auto update mode post our Apr 2019 site extension release (version 5+). This is already designed to take care of ZERO downtime during upgrades. You can check your current version at https://www.qnamaker.ai/UserSettings. If your version is older than version 5.x, you must restart the App Service to apply the latest updates to apply to your QnAMaker setup.
21+
2122
1. Go to your QnAMaker service (resource group) in the [Azure portal](https://portal.azure.com)
2223

2324
![QnAMaker Azure resource group](../media/qnamaker-how-to-troubleshoot/qnamaker-azure-resourcegroup.png)

0 commit comments

Comments
 (0)