Month: August 2024
Protect sheet by adding data in table
Hi Community,
I have a table with 5 columns, of which I need to protect 2 so that the data is not changed. The other three columns must be unlocked in order to be able to enter new data. The problem is that when I go to protect the sheet, although I can enter new data, it does not automatically enter into the table.
Does anyone know how to make some columns locked, but once new data is entered at the end, it is automatically included in the table?.
Thanks,
Francisco
Hi Community, I have a table with 5 columns, of which I need to protect 2 so that the data is not changed. The other three columns must be unlocked in order to be able to enter new data. The problem is that when I go to protect the sheet, although I can enter new data, it does not automatically enter into the table.Does anyone know how to make some columns locked, but once new data is entered at the end, it is automatically included in the table?. Thanks, Francisco Read More
New Blog | Securing Multi-Cloud Gen AI workloads using Azure Native Solutions
By Abhi Singh
Note: This series is part of “Security using Azure Native services” series and assumes that you are or planning to leverage Defender for Cloud, Defender XDR Portal, and Azure Sentinel.
Introduction
AI Based Technology introduces a new set of security risks that may not be comprehensively covered by existing risk management frameworks. Based on our experience, customers often only consider the risks related to the Gen AI models like OpenAI or Anthropic. Thereby, not taking a holistic approach that cover all aspects of the workload.
This article will help you:
Understand a typical multi-cloud Gen AI workload pattern
Articulate the technical risks exists in the AI workload
Recommend security controls leveraging Azure Native services
Read the full post here: Securing Multi-Cloud Gen AI workloads using Azure Native Solutions
By Abhi Singh
Note: This series is part of “Security using Azure Native services” series and assumes that you are or planning to leverage Defender for Cloud, Defender XDR Portal, and Azure Sentinel.
Introduction
AI Based Technology introduces a new set of security risks that may not be comprehensively covered by existing risk management frameworks. Based on our experience, customers often only consider the risks related to the Gen AI models like OpenAI or Anthropic. Thereby, not taking a holistic approach that cover all aspects of the workload.
This article will help you:
Understand a typical multi-cloud Gen AI workload pattern
Articulate the technical risks exists in the AI workload
Recommend security controls leveraging Azure Native services
Read the full post here: Securing Multi-Cloud Gen AI workloads using Azure Native Solutions Read More
What does 2 step verification in Outlook 2021 look like?
I am using Outlook 2021 with POP accounts and one step verification. I have also just setup Exchange accounts for the same email accounts in prep for the two step verification (Sept 16). I then turned on two step verification in my Outlook email account. After sending an email to the account that has two step verification on, and opening in Outlook 2021, it behaves the same with both (POP and Exchange) as it always done. There are no extra steps.
– How come the POP account works with two step verification on?
– There weren’t any extra steps for two step verification. Why?
– Related to the question above, what does sending and receiving email look like with two step verification?
I am using Outlook 2021 with POP accounts and one step verification. I have also just setup Exchange accounts for the same email accounts in prep for the two step verification (Sept 16). I then turned on two step verification in my Outlook email account. After sending an email to the account that has two step verification on, and opening in Outlook 2021, it behaves the same with both (POP and Exchange) as it always done. There are no extra steps. – How come the POP account works with two step verification on?- There weren’t any extra steps for two step verification. Why?- Related to the question above, what does sending and receiving email look like with two step verification? Read More
SharePoint List Calculated End Date Column Not Displaying Results to Other Users
Hello All: I created a calculation that returns an end date and end time based on the start date and start time using an IF statement. The calcuation works fine. I can see the results as the SharePoint owner. However, other SharePoint owners and users cannot see the end date results. Other users and owers could see the results at one point, now they cannot see them. Can anyone help me solve this problem? See pics below depicting the SharePoint owner view and user view. Thank you.
Hello All: I created a calculation that returns an end date and end time based on the start date and start time using an IF statement. The calcuation works fine. I can see the results as the SharePoint owner. However, other SharePoint owners and users cannot see the end date results. Other users and owers could see the results at one point, now they cannot see them. Can anyone help me solve this problem? See pics below depicting the SharePoint owner view and user view. Thank you. Read More
Enhancing Disaster Recovery and Ransomware Protection with Azure VMware Solution and JetStream
Enhancing Disaster Recovery and Ransomware Protection with Azure VMware Solution and JetStream Software
Disaster Recovery (DR) and ransomware protection are critical concerns for organizations today, as the frequency and cost of attacks continue to rise. Our customers demand comprehensive and cost-effective options to safeguard their critical workloads without compromising application performance.
AVS collaborates with leading technology companies, such as JetStream Software, to deliver advanced DR solutions that offer both near-zero Recovery Point Objectives (RPO) and near-zero Recovery Time Objective (RTO) options. The JetStream DR and Ransomware solution implements Continuous Data Protection (CDP) by immediately replicating all data generated by protected VMs. It employs heuristic algorithms to detect data tampering by utilizing cost-effective and high-performance storage options like Azure Blob Storage, Azure NetApp Files (ANF), and ESAN-based solutions. Utilizing the VMware-certified VAIO APIs means that the JetStream solution is fully VMware Ready certified. This approach is unique compared to other market offerings that provide DR protection by creating intermittent snapshots.
JetStream has also partnered with Microsoft to develop a unique feature that rehydrates VMs and their data from Azure Blob object storage, deploying them to AVS nodes provisioned on-demand, to a pilot light cluster in AVS. This ensures a rapid and cost-controlled recovery that minimizes downtime in the event of a disaster or ransomware attack.
To learn more about the power of this integration, watch our sessions at VMware Explore 2024 in Las Vegas:
“Future-Proof VMware Workloads with Azure VMware Solution” [Session ID: VCFB2530LVS]
“Implementing a Robust BCDR Plan with Azure VMware Solution” [Session ID: VCFB2534LVS]
“Discover the Partner Ecosystem for Azure VMware Solution” [Session ID: VCFB2532LVS]
Microsoft Tech Community – Latest Blogs –Read More
Migrating from Azure APIM STv1 to STv2: New Options and Considerations
As the support for Azure API Management (APIM) STv1 platform ends on August 31, 2024, it’s crucial for customers to migrate their instances to the STv2 platform. This blog will focus on the new migration options introduced to facilitate this process, as outlined in the attached document.
Why Migrate to STv2?
With the end of support for STv1, instances on this platform will no longer have a Service Level Agreement (SLA). Migrating to STv2 ensures continued support and access to the latest features and improvements in Azure APIM.
New Migration Options
Over the past year, several limitations in the migration process have been addressed to make it easier for instances injected into a virtual network. Here are the key improvements:
Portal Experience: Enhanced user interface for a smoother migration process.
Public IP Optional: The service can now provision a managed IP, making the public IP optional.
Retain Old Gateway: Ability to keep the old gateway for a longer duration for validation purposes.
Release Old Subnet: Option to release the old subnet sooner for customers who need to revert.
Networking Dependencies
One of the biggest challenges in the migration process has been networking dependencies, particularly the need for new subnets and IP changes. The latest migration option addresses this by allowing the retention of original IPs, both public and private.
Key Considerations for the New Migration Option
Subnet Capacity: The subnet must have enough capacity to accommodate the STv2 instance. This means the subnet should be at least half empty to allow the creation of a new STv2 gateway alongside the STv1 gateway.
Coexistence of Instances: If the subnet contains other APIM instances, they should be migrated as soon as possible to avoid conflicts during scaling or update operations.
Subnet Delegation: The subnet cannot have any deployed or delegated resources. Ensure that any delegations are removed ahead of the migration.
Disable Scaling Rules: To prevent issues during the migration, disable all scaling rules. The default coexistence period is 15 minutes for external VNet injected instances and 4 hours for internal VNet injected instances. If multiple STv1 instances exist in the same subnet, disable scaling rules across all instances until migration is complete.
Networking Settings: STv2 requires additional networking settings compared to STv1. Ensure that traffic to Azure is allowed in the existing Network Security Group (NSG), Network Virtual Appliances (NVAs), and other networking controls. This includes:
Adding an outbound rule to Azure KeyVault in the NSG.
Adding a service endpoint to Azure KeyVault on the subnet if force tunneling through an NVA.
Allowing traffic to Azure KeyVault from the subnet address space at the NVA.
Migration Options Within the Same Subnet
Preserve Original IP Addresses: This option retains the original public and private IPs, but involves downtime while the IPs are transferred from the old gateway to the new gateway.
New IP Addresses: This option uses new public IPs, which are pre-created to allow for network dependency adjustments and communication with partners. It also allows specifying the retention time of the old gateway for internal VNet injected instances, providing extended time for validation and updating network dependencies.
Migration Process
The migration process involves creating a new STv2 gateway alongside the existing STv1 gateway in the same subnet. Here are the detailed steps:
Create New Gateway: The migration process creates a new STv2 gateway in the same subnet as the old gateway. The old gateway continues to handle traffic using custom DNS settings.
Preserve IP Option:
The IPs are transferred from the old gateway to the new gateway, resulting in a brief downtime as the IPs will not respond to traffic.
The old gateway is deleted after the migration is successful.
New IP Option:
Pre-created public IPs are assigned to the new gateway.
The old gateway is retained for 15 minutes for external VNet injected instances and 4 hours for internal VNet injected instances.
Validation activities and DNS updates can be performed during the retention period to achieve a no-downtime migration.
The old gateway is deleted after the retention period elapses.
Additional Considerations
Infrastructure Configuration Lock: The infrastructure configuration will be locked for the entire duration of the migration.
Downtime: The preserve IP option will have a downtime during the IP transfer. The new IP option avoids this downtime by using pre-created public IPs.
Networking: NSG with the rules for stv2 is required to be attached to the subnet. Existing subnets need to have the additional outbound rule for Azure Key Vault
Multi Regions: There is no option to selectively upgrade the locations. A single operation will orchestrate upgrading all the regions one at a time.
Verification and Monitoring
Verify Networking: The new UI includes a Verify button to check if the network meets the requirements. This static check looks for NSGs, service endpoints, and DNS configurations but does not check blocks at the NVA level, which need to be verified manually.
Diagnose and Solve Problems: Additional detectors are available to monitor the status of the migration.
Conclusion
Migrating from STv1 to STv2 is essential to ensure continued support and access to the latest features in Azure APIM. The new migration options significantly simplify the process by addressing key challenges, particularly networking dependencies. By following the considerations and steps outlined above, customers can achieve a smooth and successful migration.
Refer the learn documentation for the complete list of migration options including the same subnet migration using Azure CLI.
!!! Note: The portal experience is not completely available and should be released soon.
Feel free to reach out with any questions or for further assistance with your migration process!
I hope this blog helps you understand the new migration options and considerations for moving from Azure APIM STv1 to STv2. If you have any specific questions or need further details, let me know!
Microsoft Tech Community – Latest Blogs –Read More
Network doesn’t work on test image
Hi all.
I’m trying to use and train a pretrained network (YOLO v2) on my own dataset (80 images).
I divided my set in training, validation and test, but network works correctly only on these images and not on other images that aren’t in these set.
What can I do? I have to test my network only on the images that I have labeled?
ThanksHi all.
I’m trying to use and train a pretrained network (YOLO v2) on my own dataset (80 images).
I divided my set in training, validation and test, but network works correctly only on these images and not on other images that aren’t in these set.
What can I do? I have to test my network only on the images that I have labeled?
Thanks Hi all.
I’m trying to use and train a pretrained network (YOLO v2) on my own dataset (80 images).
I divided my set in training, validation and test, but network works correctly only on these images and not on other images that aren’t in these set.
What can I do? I have to test my network only on the images that I have labeled?
Thanks deep learning, yolov2, matlab, neural networks MATLAB Answers — New Questions
Thermal Camera Image Analyzing
Hi,I have thermal images and I need to draw weight lines for specific points:areas in the image. How to do that?Hi,I have thermal images and I need to draw weight lines for specific points:areas in the image. How to do that? Hi,I have thermal images and I need to draw weight lines for specific points:areas in the image. How to do that? thermal, outlines, contours MATLAB Answers — New Questions
please help give me the formula
I have tried using several formulas that I know, but they still don’t work well, please help
I want to make sheet 2 a search sheet, while sheet 1 is a collection of existing data
for example, I want to see who the members of A are on 01-01-2025, and B,C,D etc.
Please help
I have tried using several formulas that I know, but they still don’t work well, please helpI want to make sheet 2 a search sheet, while sheet 1 is a collection of existing datafor example, I want to see who the members of A are on 01-01-2025, and B,C,D etc.Please help Read More
How to post using jquery to asp.net core api
I’m trying to develop a simple app to post to an api using jquery. I’ve tried multiple online suggestions and none of them work. I’ve even tried some of the AI code without success.
I can get GET to reply back with data but POST is just not working. Going on my 3rd day on this. Please help.
This is my api code:
This is what I’m trying.
Thanks for your time.
I’m trying to develop a simple app to post to an api using jquery. I’ve tried multiple online suggestions and none of them work. I’ve even tried some of the AI code without success. I can get GET to reply back with data but POST is just not working. Going on my 3rd day on this. Please help.This is my api code: This is what I’m trying. Thanks for your time. Read More
error message keeps showing on opening file
I’m working in excel and I have an error that keeps popping up on opening of the workbook.
Below is the error:
“cannot find #REF!#REF!, which has been assigned to run each time [xxx.xls] is opened.continuing…..”
Now it always looks like there is something wrong with the file. Anyone knows how to solve this?
I’m working in excel and I have an error that keeps popping up on opening of the workbook.Below is the error:”cannot find #REF!#REF!, which has been assigned to run each time [xxx.xls] is opened.continuing…..”Now it always looks like there is something wrong with the file. Anyone knows how to solve this? Read More
New Blog | Guided walkthrough of the Microsoft Purview extended report experience
This is a step-by-step guided walkthrough of the Microsoft Purview extended report experience and how it can empower your organization to understand the cyber security risks in a context that allows them to achieve more. By focusing on the information and organizational context to reflect the real impact/value of investments and incidents in cyber.
Prerequisites
License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements. For the best experience, all Microsoft Defender products should be enabled.
Follow the step-by-step guide to set up the reporting found here.
The DLP incident management documentation can be found here.
Install Power BI Desktop to make use of the templates Downloads | Microsoft Power BI
Read the full post here: Guided walkthrough of the Microsoft Purview extended report experience
By Jon Nordström
This is a step-by-step guided walkthrough of the Microsoft Purview extended report experience and how it can empower your organization to understand the cyber security risks in a context that allows them to achieve more. By focusing on the information and organizational context to reflect the real impact/value of investments and incidents in cyber.
Prerequisites
License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements. For the best experience, all Microsoft Defender products should be enabled.
Follow the step-by-step guide to set up the reporting found here.
The DLP incident management documentation can be found here.
Install Power BI Desktop to make use of the templates Downloads | Microsoft Power BI
Read the full post here: Guided walkthrough of the Microsoft Purview extended report experience
New Blog | How to build the Microsoft Purview Extended Report Experience
By
This is a step-by-step guided walkthrough of the extended report experience.
Prerequisites
License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements.
Before you start, all endpoint interaction with Sensitive content is already being included in the audit logging with Endpoint DLP enabled. For Microsoft 365 SharePoint, OneDrive Exchange, Teams you can enable policies that generate events but not incidents for important sensitive information types.
Install Power BI Desktop to make use of the templates Downloads | Microsoft Power BI
Read the full post here: How to build the Microsoft Purview Extended Report Experience
By
This is a step-by-step guided walkthrough of the extended report experience.
Prerequisites
License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements.
Before you start, all endpoint interaction with Sensitive content is already being included in the audit logging with Endpoint DLP enabled. For Microsoft 365 SharePoint, OneDrive Exchange, Teams you can enable policies that generate events but not incidents for important sensitive information types.
Install Power BI Desktop to make use of the templates Downloads | Microsoft Power BI
Read the full post here: How to build the Microsoft Purview Extended Report Experience Read More
New Blog | Learn how to customize Copilot for Security with the Data Security plugin
This is a step-by-step guided walkthrough of how to use the custom Copilot for Security pack for Microsoft Data Security and how it can empower your organization to understand the cyber security risks in a context that allows them to achieve more. By focusing on the information and organizational context to reflect the real impact/value of investments and incidents in cyber. We are working to add this to our native toolset as well, we will update once ready.
Prerequisites
License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements. You also need to be licensed for Microsoft Copilot for Security, more information here.
Consider setting up Azure AI Search to ingest policy documents, so that they can be part of the process.
Read the full post here: Learn how to customize and optimize Copilot for Security with the custom Data Security plugin
By Jon Nordström
This is a step-by-step guided walkthrough of how to use the custom Copilot for Security pack for Microsoft Data Security and how it can empower your organization to understand the cyber security risks in a context that allows them to achieve more. By focusing on the information and organizational context to reflect the real impact/value of investments and incidents in cyber. We are working to add this to our native toolset as well, we will update once ready.
Prerequisites
License requirements for Microsoft Purview Information Protection depend on the scenarios and features you use. To understand your licensing requirements and options for Microsoft Purview Information Protection, see the Information Protection sections from Microsoft 365 guidance for security & compliance and the related PDF download for feature-level licensing requirements. You also need to be licensed for Microsoft Copilot for Security, more information here.
Consider setting up Azure AI Search to ingest policy documents, so that they can be part of the process.
Read the full post here: Learn how to customize and optimize Copilot for Security with the custom Data Security plugin Read More
MDM Entra and MDM Authority and MDM in Intune?!!
Alright folks, I’ve been beating my head against a wall for two weeks and I can’t do it any longer.
I’ll preface this with, “I’m new to this.” That said, I’m great at figuring stuff out but the documentation on this process is lacking in so many ways.
I’ve come on with a company that was, as far as I can tell, not managing their devices (in this case, Windows devices). I set about learning everything I could about Entra/Azure (whatever we’re calling it these days) and Intune, registering devices, enrolling devices, etc.
We currently pay for 25 Intune licenses. I have one. My Test User account has one. My DEM user has one (which I’ve set up as a DEM in Intune). And one of our actual employees has one. Both devices were set up as an OOBE (one brand new and one wiped and reset). For one of them I used ‘Work/School’ login on startup and signed in with my DEM account. For the other I used ‘Work/School’ and signed in with my Test User account.
First thing I knew was to make sure our MDM Authority was set to Intune. I checked and it’s currently reading as “Microsoft Office 365” (see image) I’ve read about an ‘orange bar.’ I don’t have an orange bar. I read about, “Depending on whether your tenant was pre or post 1911 Service Release, Intune is automatically set as your MDM.” and “If Mobile Device Management Authority was set, you cannot change this.”
So, my first question.. because I’m confused. How is someone supposed to know what their current MDM is set to if nothing reads as all of the documentation reads. How do I know if MDMA was set as the MDM and, if so, is Microsoft Office 365 the same thing as MDMA (for some silly reason)? And if my MDM was set and now I can’t change it, do I just assume that even though it says ONE thing, I’m supposed to just ignore it and believe my MDM is actually Intune?
That’s the first issue.
Second. In Entra/Azure the two devices I’ve been using to try and understand this convoluted process say they are being managed (MDM) by”Office 365 Mobile.” What the actual… is Office 365 Mobile really Microsoft Office 365 which is really Intune???? I’m lost. (see image)
To make matters worse/more confusing. IN Intune when I look at the devices, it says there the devices MDM is INTUNE!?!! (see image)
I don’t really know what I’m missing. I keep reading something about adding Intune as an MDM Authority and being able to choose which Authority I am using to manage devices but, as with everything Microsoft, who knows what’s changed since all of this documentation, blog posts, etc. were written. I can’t, for the life of me, find anywhere to ‘add’ Intune.
Can someone PLEASE help me understand this. I’ve been at this for weeks, I have a timeline as we’re rolling out a bunch of new devices and I don’t want to miss this opportunity to do it the right way.
I feel like I’m getting close but, on top of being unsure of whether they are even actually being managed by Intune, none of the basic policies I’ve created are being pushed to the devices regardless of how many times I’ve checked to make sure the users are in the right group, etc. etc. etc.
I’ve tried adding corporate identifiers. I feel like I’ve tried everything.
I’m pulling my hair out.
Alright folks, I’ve been beating my head against a wall for two weeks and I can’t do it any longer.I’ll preface this with, “I’m new to this.” That said, I’m great at figuring stuff out but the documentation on this process is lacking in so many ways.I’ve come on with a company that was, as far as I can tell, not managing their devices (in this case, Windows devices). I set about learning everything I could about Entra/Azure (whatever we’re calling it these days) and Intune, registering devices, enrolling devices, etc. We currently pay for 25 Intune licenses. I have one. My Test User account has one. My DEM user has one (which I’ve set up as a DEM in Intune). And one of our actual employees has one. Both devices were set up as an OOBE (one brand new and one wiped and reset). For one of them I used ‘Work/School’ login on startup and signed in with my DEM account. For the other I used ‘Work/School’ and signed in with my Test User account. First thing I knew was to make sure our MDM Authority was set to Intune. I checked and it’s currently reading as “Microsoft Office 365” (see image) I’ve read about an ‘orange bar.’ I don’t have an orange bar. I read about, “Depending on whether your tenant was pre or post 1911 Service Release, Intune is automatically set as your MDM.” and “If Mobile Device Management Authority was set, you cannot change this.”So, my first question.. because I’m confused. How is someone supposed to know what their current MDM is set to if nothing reads as all of the documentation reads. How do I know if MDMA was set as the MDM and, if so, is Microsoft Office 365 the same thing as MDMA (for some silly reason)? And if my MDM was set and now I can’t change it, do I just assume that even though it says ONE thing, I’m supposed to just ignore it and believe my MDM is actually Intune?That’s the first issue.Second. In Entra/Azure the two devices I’ve been using to try and understand this convoluted process say they are being managed (MDM) by”Office 365 Mobile.” What the actual… is Office 365 Mobile really Microsoft Office 365 which is really Intune???? I’m lost. (see image)To make matters worse/more confusing. IN Intune when I look at the devices, it says there the devices MDM is INTUNE!?!! (see image)I don’t really know what I’m missing. I keep reading something about adding Intune as an MDM Authority and being able to choose which Authority I am using to manage devices but, as with everything Microsoft, who knows what’s changed since all of this documentation, blog posts, etc. were written. I can’t, for the life of me, find anywhere to ‘add’ Intune. Can someone PLEASE help me understand this. I’ve been at this for weeks, I have a timeline as we’re rolling out a bunch of new devices and I don’t want to miss this opportunity to do it the right way.I feel like I’m getting close but, on top of being unsure of whether they are even actually being managed by Intune, none of the basic policies I’ve created are being pushed to the devices regardless of how many times I’ve checked to make sure the users are in the right group, etc. etc. etc.I’ve tried adding corporate identifiers. I feel like I’ve tried everything.I’m pulling my hair out. Read More
PerfView: ASP.NET Core Stats View
This is something I built earlier this year and it was merged into the main PerfView source in mid-April, and released in v3.1.10. It’s a view that was built to consume Microsoft.AspNetCore.Hosting EventSource events and display a page similar to the IIS Stats view for those that are familiar with that one. If any of those events exist in a trace being opened by PerfView, the stats view will be available. If the trace doesn’t contain any of those events, then the view will not be visible.
Additionally, in the past couple months, the Azure App Service Product Group modified the DaaS (Diagnostics as a Service) .NET Profiler trace to automatically collect these events on both Linux and Windows App Services. This means recent App Service traces (from within the last ~1month or so) will have the events and thus the view should be available when the trace is opened in PerfView.
Where is it?
When opening a trace containing the aforementioned events in PerfView v3.1.10+, the new view will be exposed in the Advanced folder:
What does it look like?
Fortunately, it looks the same regardless of what kind of trace you’re looking at:
That one is from a dotnet-trace taken from one of my Linux App Services via the .NET Profiler (under-the-hood this profiler just uses a preconfigured dotnet-trace command).
Here is one from a Windows App Service, also captured via .NET Profiler (these come as ZIPs, extract the zip so PerfView can open the .diagsession file):
Side note about the Windows App Service profiler traces – these are saved as ZIP files. The zip must be extracted so PerfView can get to the .diagsession file inside. When viewing the .diagsession in PerfView, there is an unresolved bug where it doesn’t refresh the screen:
So double-clicking won’t give you the option to expand the trace (i.e. the arrow above won’t show up) – you can just refresh the window with F5 and the arrow will appear. From there you can expand the trace like the screenshot shown earlier.
So what about non-AppService scenarios?
The events can be captured with PerfView by adding the “*Microsoft.AspNetCore.Hosting” provider in the GUI or the command line (note the asterisk * – that is critical for PerfView to be able to capture any .NET/Core event sources):
Command-line:
PerfView.exe “/DataFile:PerfViewData.etl” /BufferSizeMB:512 /StackCompression /CircularMB:500 /Providers:”*Microsoft.AspNetCore.Hosting,Microsoft-Windows-IIS,*Microsoft-Extensions-Logging:4:5″ /ContinueOnError /NoGui /NoNGenRundown collect
Or captured using dotnet-trace (does not need the leading asterisk):
dotnet-trace collect –providers Microsoft.AspNetCore.Hosting,Microsoft-Extensions-Logging:4:5 -p ###
What if I’m interested in a specific request?
Clicking the ActivityId of that request will open the Events view with that ID as a text filter and the start and stop time of the events being specific to that request (all of the events are selected by-default):
Notice the first event in that list is Microsoft.AspNetCore.Hosting/Request/Start – the last one should be the corresponding Request/Stop event, assuming the trace contains it.
Any other events that contain that ActivityId will also be displayed. You can then filter through these events as usual (removing different types you don’t care about, etc.) to hone-in on what you want to see.
I have already used this view many times as it saves many clicks when looking for specific requests and such. Hopefully it helps you too!
If capturing your own trace, I strongly recommend also including the Microsoft-Extensions-Logging:4:5 provider (yes those are dashes, and don’t forget the leading asterisk if using PerfView to capture, otherwise it’s the same) as that is where ASP.NET Core itself writes its logs, as well as anything else that uses ILogger. Sometimes those events aren’t available for various reasons, but when they are they’re usually helpful. The 4 in that provider is the keyword and for that provider it means capture only the FormattedMessage events, while the 5 is the verbosity (5=verbose). See: https://learn.microsoft.com/en-us/aspnet/core/fundamentals/logging/?view=aspnetcore-8.0#dotnet-trace-tooling
Over time, as time is available, I plan to tweak the view and try to add more features to it.
Related links:
Original PR: https://github.com/microsoft/perfview/pull/2001
Added clickable ActivityIds to bring up the Events view: https://github.com/microsoft/perfview/pull/2028
PerfView 3.1.10 release where this was first available: https://github.com/microsoft/perfview/releases/tag/v3.1.10
Latest PerfView release (currently 3.1.13): https://github.com/microsoft/perfview/releases/latest
Microsoft Tech Community – Latest Blogs –Read More
Live script fprintf temporarily not printing whole line
While doing a bunch of file IO in a Live Script, and printing with fprintf, sometimes the line does not complete printing. Temporarily, it looks like the image below until the next iteration begins.
I was able to sort of recreate the effect with the code below, but what can be only a flicker in the execution of this snippet is much more noticable on my other project.
for i= 1:10
fprintf("Hello %dn",i)
B= inv(rand(3000)+ 2*eye(3000));
end
Is this a bug or am I missing something?While doing a bunch of file IO in a Live Script, and printing with fprintf, sometimes the line does not complete printing. Temporarily, it looks like the image below until the next iteration begins.
I was able to sort of recreate the effect with the code below, but what can be only a flicker in the execution of this snippet is much more noticable on my other project.
for i= 1:10
fprintf("Hello %dn",i)
B= inv(rand(3000)+ 2*eye(3000));
end
Is this a bug or am I missing something? While doing a bunch of file IO in a Live Script, and printing with fprintf, sometimes the line does not complete printing. Temporarily, it looks like the image below until the next iteration begins.
I was able to sort of recreate the effect with the code below, but what can be only a flicker in the execution of this snippet is much more noticable on my other project.
for i= 1:10
fprintf("Hello %dn",i)
B= inv(rand(3000)+ 2*eye(3000));
end
Is this a bug or am I missing something? live, script, fprinf MATLAB Answers — New Questions
Matlab code for calculating characteristics equation
I have the code below to obtain the characteristic equation of a 6by6 matrix but it giving me an error of sym
% Define a symbolic 6×6 matrix with entries as a mixture of alphabet letters and zeros
syms a b c d e f g h i j k l m n p q r s t I v w x y z
A = [-a 0 b -c d e; f -g 0 0 h 0; 0 0 -i c 0 e; 0 0 j -k 0 0; 0 0 0 l -m 0; 0 0 0 n 0 -p];
% Calculate the characteristic polynomial of the matrix A
char_eqn = charpoly(A);
disp(‘The characteristic equation of the matrix A is:’)
disp(char_eqn)I have the code below to obtain the characteristic equation of a 6by6 matrix but it giving me an error of sym
% Define a symbolic 6×6 matrix with entries as a mixture of alphabet letters and zeros
syms a b c d e f g h i j k l m n p q r s t I v w x y z
A = [-a 0 b -c d e; f -g 0 0 h 0; 0 0 -i c 0 e; 0 0 j -k 0 0; 0 0 0 l -m 0; 0 0 0 n 0 -p];
% Calculate the characteristic polynomial of the matrix A
char_eqn = charpoly(A);
disp(‘The characteristic equation of the matrix A is:’)
disp(char_eqn) I have the code below to obtain the characteristic equation of a 6by6 matrix but it giving me an error of sym
% Define a symbolic 6×6 matrix with entries as a mixture of alphabet letters and zeros
syms a b c d e f g h i j k l m n p q r s t I v w x y z
A = [-a 0 b -c d e; f -g 0 0 h 0; 0 0 -i c 0 e; 0 0 j -k 0 0; 0 0 0 l -m 0; 0 0 0 n 0 -p];
% Calculate the characteristic polynomial of the matrix A
char_eqn = charpoly(A);
disp(‘The characteristic equation of the matrix A is:’)
disp(char_eqn) syms, symbolic MATLAB Answers — New Questions
Homepage tab not loading 128.0.2739.42
The latest stable version of Edge seems to have broken the new tab homepage for us. The tab opens but just says “loading” and never completes. Opening a new tab resolves the issue. This is only happening on Stable, not in Canary or Dev, version 128.0.2739.42.
The latest stable version of Edge seems to have broken the new tab homepage for us. The tab opens but just says “loading” and never completes. Opening a new tab resolves the issue. This is only happening on Stable, not in Canary or Dev, version 128.0.2739.42. Read More
Sharepoint & OneDrive idle timeout when using desktop app
There are users in our facility who only rarely interact with Microsoft apps outside of one log per department. Last month on July 9, we moved the two essential logs onto a pair of Sharepoint sites, and set these users up with OneDrive shortcuts that open the content in desktop Excel, which is installed through our Microsoft 365 license.
Sometime on Wednesday, the OneDrive and Sharepoint sign-ins for all 3 users signed out, despite the fact they were accessing these logs every day through the desktop apps. I just had to run around, signing everything in and making backups to keep Sharepoint from overwriting the last few days of work.
Why would they time out despite accessing these shared files every day?
How do we prevent this from happening again?
There are users in our facility who only rarely interact with Microsoft apps outside of one log per department. Last month on July 9, we moved the two essential logs onto a pair of Sharepoint sites, and set these users up with OneDrive shortcuts that open the content in desktop Excel, which is installed through our Microsoft 365 license. Sometime on Wednesday, the OneDrive and Sharepoint sign-ins for all 3 users signed out, despite the fact they were accessing these logs every day through the desktop apps. I just had to run around, signing everything in and making backups to keep Sharepoint from overwriting the last few days of work. Why would they time out despite accessing these shared files every day?How do we prevent this from happening again? Read More