You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Event Hubs traffic is controlled by throughput units. A single throughput unit allows 1 MB per second or 1,000 events per second of ingress and twice that amount of egress. Standard Event Hubs can be configured with 1-20 throughput units, and you can purchase more with a quota increase support request. Usage beyond your purchased throughput units is throttled. Event Hubs Capture copies data directly from the internal Event Hubs storage, bypassing throughput unit egress quotas and saving your egress for other processing readers, such as Stream Analytics or Spark.
31
+
Event Hubs traffic is controlled by throughput units (TUs). Each TU provides up to 1 MB per second of ingress (or roughly 1,000 1‑KB events per second) and up to 2 MB per second of egress (or 4,096 events per second). Standard Event Hubs can be configured with 1-40 throughput units per namespace; you can enable auto-inflate to scale up to a configured maximum or request a higher quota. Usage beyond your purchased TUs is throttled. Event Hubs Capture copies data directly from internal Event Hubs storage, bypassing TU egress and preserving egress for other processing readers, such as Stream Analytics or Spark.
32
32
33
33
Once configured, Event Hubs Capture runs automatically when you send your first event, and continues running. To make it easier for your downstream processing to know that the process is working, Event Hubs writes empty files when there's no data. This process provides a predictable cadence and marker that can feed your batch processors.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/configure-web-app-settings/includes/5-enable-diagnostic-logging.md
+26-6Lines changed: 26 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ The following table shows the types of logging, the platforms supported, and whe
12
12
13
13
## Enable application logging (Windows)
14
14
15
-
1. To enable application logging for Windows apps in the Azure portal, navigate to your app and select **App Service logs**.
15
+
1. To enable application logging for Windows apps in the Azure portal, navigate to your app and select **Monitoring** > **App Service logs**.
16
16
17
17
1. Select **On** for either **Application Logging (Filesystem)** or **Application Logging (Blob)**, or both. The **Filesystem** option is for temporary debugging purposes, and turns itself off in 12 hours. The **Blob** option is for long-term logging, and needs a blob storage container to write logs to.
18
18
@@ -57,25 +57,42 @@ In your application code, you use the usual logging facilities to send log messa
57
57
System.Diagnostics.Trace.TraceError("If you're seeing this, something bad happened");
>Sometypesofloggingbufferwritetothelogfile, whichcanresultinoutofordereventsinthestream. Forexample, anapplicationlogentrythatoccurswhenauservisitsapagemaybedisplayedinthestreambeforethecorrespondingHTTPlogentryfor the page request.
70
81
71
82
* Azure portal - To stream logs in the Azure portal, navigate to your app and select **Log stream**.
72
83
73
-
* Azure CLI - To stream logs live in Cloud Shell, use the following command:
84
+
* Azure CLI - To stream logs live in Cloud Shell, use the following command (note:CloudShellmaynotworkforsomeLinux-basedplans; usethelocalCLIifneeded):
Tofilterspecificlogtypes, suchasHTTPorapplicationlogs, usethe `--provider` parameter, for example:
91
+
92
+
```bash
93
+
az webapp log tail --name appname --resource-group myResourceGroup --provider http
94
+
```
95
+
79
96
* Local console - To stream logs in the local console, install Azure CLI and sign in to your account. Once signed in, follow the instructions shown for Azure CLI.
80
97
81
98
## Access log files
@@ -85,7 +102,10 @@ If you configure the Azure Storage blobs option for a log type, you need a clien
85
102
For logs stored in the App Service file system, the easiest way is to download the ZIP file in the browser at:
* Windows apps: `https://<app-name>.scm.azurewebsites.net/api/dump`
105
+
* Windows apps: `https://<app-name>.scm.azurewebsites.net/api/logs/zip`
106
+
107
+
> [!NOTE]
108
+
> The `api/dump` endpoint downloads a full diagnostic dump, not just logs. Use `api/logs/zip` to download only log files.
89
109
90
110
For Linux/container apps, the ZIP file contains console output logs for both the docker host and the docker container. For a scaled-out app, the ZIP file contains one set of logs for each instance. In the App Service file system, these log files are the contents of the */home/LogFiles* directory.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/implement-azure-container-apps/includes/6-container-apps-revisions-secrets.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ az containerapp update \
15
15
--image <IMAGE_NAME>
16
16
```
17
17
18
-
You can list all revisions associated with your container app with the `az containerapp revision list` command.
18
+
You can list all revisions associated with your container app with the `az containerapp revision list` command.
19
19
20
20
```bash
21
21
az containerapp revision list \
@@ -43,7 +43,7 @@ An updated or deleted secret doesn't automatically affect existing revisions in
43
43
Before you delete a secret, deploy a new revision that no longer references the old secret. Then deactivate all revisions that reference the secret.
44
44
45
45
> [!NOTE]
46
-
> Container Apps doesn't support Azure Key Vault integration. Instead, enable managed identity in the container app and use the Key Vault SDK in your app to access secrets.
46
+
> Container Apps supports native Azure Key Vault integration. Enable managed identity in the container app, grant the identity the **Key Vault Secrets User** role, and define secrets as Key Vault references using the secret's URI. Container Apps automatically retrieves and refreshes the secret value.
0 commit comments