You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/inject-vnet-v2.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ If you want to enable *public* inbound access to an API Management instance in t
54
54
* Minimum: /27 (32 addresses)
55
55
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
56
56
57
-
### Examples
57
+
####Examples
58
58
59
59
The following table shows subnet sizing examples for API Management virtual network injection, illustrating how different CIDR blocks affect the number of scale-out units possible:
60
60
@@ -64,18 +64,19 @@ The following table shows subnet sizing examples for API Management virtual netw
64
64
| /26 | 64 | 5 | 2 | 1 | 56 | 28 | 29 |
65
65
| /25 | 128 | 5 | 2 | 1 | 120 | 30*| 30*|
66
66
67
+
<sup>*</sup> Premium v2 limit
67
68
68
-
### Key Points
69
+
####Key points
69
70
70
71
-**Minimum subnet size**: /27 (provides 24 usable IP addresses for API Management)
71
72
-**Azure reserved IPs**: 5 addresses per subnet (first and last for protocol conformance, plus 3 for Azure services)
72
73
-**Scale-out requirement**: Each scale-out unit requires 2 IP addresses
73
74
-**Internal load balancer**: Only required when API Management is deployed in internal virtual network mode
74
-
-**Premium V2 limit**: * Currently supports up to 30 units maximum.
75
+
-**Premium V2 limit**: Currently supports up to 30 units maximum.
75
76
76
77
> [!IMPORTANT]
77
-
> API Management is a member of Azure Integration Services and is typically deployed as a pivotal service in enterprise architectures. It is prudent to err on the higher side of available IPs for the API Management subnet as changing it later can have far-reaching impact.
78
-
> The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning might cause a change in the private IP address.
78
+
> -API Management is a member of Azure Integration Services and is typically deployed as a pivotal service in enterprise architectures. It is prudent to err on the higher side of available IPs for the API Management subnet as changing it later can have far-reaching impact.
79
+
> -The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning might cause a change in the private IP address.
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-diagnostics.md
+44-3Lines changed: 44 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ services: application-gateway
7
7
author: mbender-ms
8
8
ms.service: azure-application-gateway
9
9
ms.topic: concept-article
10
-
ms.date: 06/16/2025
10
+
ms.date: 01/05/2026
11
11
ms.author: mbender
12
12
ms.custom:
13
13
- ai-gen-docs-bap
@@ -35,6 +35,47 @@ You can use different types of logs in Azure to manage and troubleshoot applicat
35
35
> [!NOTE]
36
36
> Logs are available only for resources deployed in the Azure Resource Manager deployment model. You can't use logs for resources in the classic deployment model. For a better understanding of the two models, see the [Understanding Resource Manager deployment and classic deployment](../azure-resource-manager/management/deployment-models.md) article.
37
37
38
+
## Storage locations for diagnostic logs
39
+
Azure Monitor provides multiple options for storing resource logs depending on your analysis, retention, and integration requirements. When configuring diagnostic settings, you can choose one or more destinations for log collection.
40
+
41
+
**Log Analytics workspace (recommended)**
42
+
A Log Analytics workspace is the recommended destination for collecting and analyzing Application Gateway resource logs. It enables:
43
+
44
+
- Use of predefined queries and visualizations
45
+
- Creation of alerts based on specific log conditions
46
+
- Integration with Azure Monitor features and insights
47
+
In Log Analytics, the table used for storing diagnostic logs depends on the collection type configured in the diagnostic setting.
48
+
49
+
**Collection types in Log Analytics**
50
+
51
+
**Azure Diagnostics (legacy):** When you select Azure Diagnostics, all logs are written to the shared AzureDiagnostics table.Because this table is shared across many resource types, each service writes its own custom fields. When the number of custom fields exceeds 500, additional fields are stored under the AdditionalFields dynamic property as key/value pairs. This can lead to reduced discoverability and more complex queries.
52
+
53
+
**Resource-specific (recommended):** When you select Resource-specific, logs are written into dedicated tables for each category.
54
+
Resource-specific mode provides:
55
+
56
+
- Simplified querying with predictable schemas
57
+
- Improved discoverability of fields and table structures
58
+
- Better performance due to lower ingestion latency and faster query execution
59
+
- Granular RBAC by assigning access at the table level
60
+
61
+
For Application Gateway, resource-specific mode creates the following tables:
**Selecting the collection type in Log analytics**
68
+
69
+
Azure services are transitioning to resource-specific mode. As part of this migration, a toggle is available in the diagnostic settings to choose either:
70
+
71
+
- Resource-specific (default)
72
+
- Azure Diagnostics
73
+
74
+
The toggle determines whether logs for the selected categories are routed to dedicated tables or to the AzureDiagnostics table. When switching to resource-specific mode, only newly selected categories use the dedicated tables; existing streams continue unchanged until reconfigured.
75
+
76
+
Selecting resource-specific mode provides enhanced flexibility through workspace transformations, allowing you to preprocess data before ingestion.For guidance on configuring workspace transformations, see: [Tutorial: Add a workspace transformation to Azure Monitor Logs by using the Azure portal](/azure/azure-monitor/logs/tutorial-workspace-transformations-portal.md)
77
+
78
+
38
79
## Examples of optimizing access logs using Workspace Transformations
39
80
40
81
**Example 1: Selective Projection of Columns**: Imagine you have application gateway access logs with 20 columns, but you're interested in analyzing data from only six specific columns. By using workspace transformation, you can project these six columns into your workspace, effectively excluding the other 14 columns. Even though the original data from those excluded columns won't be stored, empty placeholders for them still appear in the Logs blade. This approach optimizes storage and ensures that only relevant data is retained for analysis.
@@ -58,7 +99,7 @@ Other storage locations:
58
99
-**Azure Event Hubs**: Event hubs are a great option for integrating with other security information and event management (SIEM) tools to get alerts on your resources.
59
100
-**Azure Monitor partner integrations**.
60
101
61
-
Learn more about the Azure Monitor's [diagnostic settings destinations](/azure/azure-monitor/essentials/diagnostic-settings?WT.mc_id=Portal-Microsoft_Azure_Monitoring&tabs=portal#destinations) .
102
+
Learn more about the Azure Monitor's [diagnostic settings destinations](/azure/azure-monitor/essentials/diagnostic-settings.md) .
62
103
63
104
## Enable logging through PowerShell
64
105
@@ -116,4 +157,4 @@ You can also connect to your storage account and retrieve the JSON log entries f
116
157
117
158
- Visualize counter and event logs by using [Azure Monitor logs](/previous-versions/azure/azure-monitor/insights/azure-networking-analytics).
118
159
- [Visualize your Azure activity log with Power BI](https://powerbi.microsoft.com/blog/monitor-azure-audit-logs-with-power-bi/) blog post.
119
-
- [View and analyze Azure activity logs in Power BI and more](https://azure.microsoft.com/blog/analyze-azure-audit-logs-in-powerbi-more/) blog post.
160
+
- [View and analyze Azure activity logs in Power BI and more](https://azure.microsoft.com/blog/analyze-azure-audit-logs-in-powerbi-more/) blog post.
This function returns the object that is passed during deployment. The properties in the returned object differ based on whether you are:
71
-
72
-
- deploying a local Bicep file.
73
-
- deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management group](deploy-to-management-group.md), or [tenant](deploy-to-tenant.md)).
74
-
75
-
When deploying a local Bicep file to a resource group, the function returns the following format:
76
-
77
-
```json
78
-
{
79
-
"name": "",
80
-
"properties": {
81
-
"template": {
82
-
"$schema": "",
83
-
"contentVersion": "",
84
-
"parameters": {},
85
-
"variables": {},
86
-
"resources": [],
87
-
"outputs": {}
88
-
},
89
-
"templateHash": "",
90
-
"parameters": {},
91
-
"mode": "",
92
-
"provisioningState": ""
93
-
}
94
-
}
95
-
```
96
-
97
-
When you deploy to an Azure subscription, management group, or tenant, the return object includes a `location` property. The `location` property isn't included when deploying a local Bicep file. The format is:
98
-
99
-
```json
100
-
{
101
-
"name": "",
102
-
"location": "",
103
-
"properties": {
104
-
"template": {
105
-
"$schema": "",
106
-
"contentVersion": "",
107
-
"resources": [],
108
-
"outputs": {}
109
-
},
110
-
"templateHash": "",
111
-
"parameters": {},
112
-
"mode": "",
113
-
"provisioningState": ""
114
-
}
115
-
}
116
-
```
70
+
Bicep files are sometimes compiled to [languageVersion 2.0](../templates/syntax.md#languageversion-20) ARM templates. Therefore, Bicep type checking considers the `deployment()` function to return only the subset of properties as would be returned in a languageVersion 2.0 ARM template. For more information, see [deployment() function for languageVersion 2.0](../templates/template-functions-deployment.md#deployment).
117
71
118
72
### Example
119
73
@@ -127,23 +81,23 @@ The preceding example returns the following object:
"_EXPERIMENTAL_WARNING": "This template uses ARM features that are experimental. Experimental features should be enabled for testing purposes only, as there are no guarantees about the quality or stability of these features. Do not enable these settings for any production usage, or your production environment may be subject to breaking.",
description: Describes the functions to use in an Azure Resource Manager template (ARM template) to retrieve deployment information.
4
4
ms.topic: reference
5
5
ms.custom: devx-track-arm-template
6
-
ms.date: 08/05/2025
6
+
ms.date: 01/06/2026
7
7
---
8
8
9
9
# Deployment functions for ARM templates
@@ -81,9 +81,9 @@ In Bicep, use the [`deployment`](../bicep/bicep-functions-deployment.md#deployme
81
81
82
82
This function returns the object that's passed during deployment. The properties in the returned object differ based on if you're:
83
83
84
-
- Deploying a template or a template spec.
85
-
- Deploying a template that's a local file or deploying a template that's a remote file accessed through a URI.
86
-
- Deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management groups](deploy-to-management-group.md), or [tenants](deploy-to-tenant.md)).
84
+
* Deploying a template or a template spec.
85
+
* Deploying a template that's a local file or deploying a template that's a remote file accessed through a URI.
86
+
* Deploying to a resource group or deploying to one of the other scopes ([Azure subscription](deploy-to-subscription.md), [management groups](deploy-to-management-group.md), or [tenants](deploy-to-tenant.md)).
87
87
88
88
When deploying a local template to a resource group, the function returns the following format:
89
89
@@ -188,7 +188,8 @@ When deploying a [languageVersion 2.0](./syntax.md#languageversion-20) template,
188
188
"location": "",
189
189
"properties": {
190
190
"template": {
191
-
"contentVersion": ""
191
+
"contentVersion": "",
192
+
"metadata": {}
192
193
},
193
194
"templateLink": {
194
195
"id": "",
@@ -198,6 +199,8 @@ When deploying a [languageVersion 2.0](./syntax.md#languageversion-20) template,
198
199
}
199
200
```
200
201
202
+
The `location` property is included only for deployments at the [subscription](./deploy-to-subscription.md), [management group](./deploy-to-management-group.md), or [tenant](./deploy-to-tenant.md) scope. The `templateLink` property is included only when the user provides a linked template rather than an inline template.
203
+
201
204
### Remarks
202
205
203
206
You can use `deployment()` to link to another template based on the URI of the parent template:
Track all the jobs using the `Get-AzDataProtectionJob` cmdlet. You can list all jobs and fetch a particular job detail. Alternatively, use Az.ResourceGraph to track jobs across all Backup vaults.
Copy file name to clipboardExpand all lines: articles/container-apps/sessions-code-interpreter.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -184,7 +184,7 @@ If you're not using an LLM framework integration, you can interact with the sess
184
184
185
185
## Execute code in a session
186
186
187
-
To execute code in a session, send a `POST` request to the `code/execute` endpoint with the code to run in the request body.
187
+
To execute code in a session, send a `POST` request to the `code/execute` endpoint with the code to run in the request body. Each code execution is limited to a maximum runtime of 220 seconds.
188
188
189
189
The following example prints `Hello, world!` in Python.
0 commit comments