The average response time metric is not very useful if it is counting signalr persistent connections. I can't filter out these requests in the default dashboard graphs and it's a pain to filter it out in every single graph I create. There needs to be a way to ignore certain patterns from being tracked.63 votes
We have multiple application insights instances (test, acc, prod) and want to configure them as Infrastructure as Code using ARM templates. It seems to be possible to add alerts to the templates, however I'm not able to add our share queries from our insights analytics to an ARM template. To be able to redeploy and keep track of our queries we want be able to add the developed queries in our ARM templates and deploy them as IAC.53 votes
Save queries and shared saved queries support in ARM template is now planned.
This should enable programmatic update of saved queries.
Add Heat Map Analysis. This is a very useful tool in analysis so its great if we can include this.30 votes
We’ve complete most of the design work of this cool and useful feature. Due to other priorities, implementation is being postponed. We will update as implementation starts.
Are there any plans in making application insights available for Azure Germany regions?25 votes
Now planning to build out first in the Germany West Central Region. Pushing hard to get many regions deployed, Germany West Central is targeted for Q4 CY 2019.
Add other users to a mailing list when the daily data cap has reached its maximum limit in App Insights19 votes
We’re investigating how to enable alerting based on the Activity Log events related to daily caps.
The email is usually a low priority tool. When there is a critical problem, I notice it too late (when I take the cell to check the email). I usually recive thousands of emails every day, however, push notifications are much less common and more visible.15 votes
While there’s no update to the status of this suggestion, you may find an interim solution for setting up alerts on the Smart Detection preview rules described in this article:
Hope this helps.
Support Authenticated User id in usage scenarios . For retention currently we are showing retention users value wrt user_Id column. It would be good if we can support user_AuthenticatedId. Similarly for other usage blade like users, session, workbook, funnel etc.11 votes
Counting by authenticated users is supported in the Users, Sessions, Events, and Cohorts tools. The Retention tool doesn’t support authenticated user counting, but the “N-period retention” workbook template does…check it out in the Workbooks tool. Counting authenticated users is on the backlog for the Funnels tool, but no ETA on when it will arrive.
- David from the App Insights team
For Metric Charts there are options Sum, Min, Max, Avg.
An additional option Median would be often helpful because it is resistant against outliers.
(The median is the number separating the higher half of values from the lower half.)11 votes
I found current URL Ping test doesn't validate the HTTPS connection, e.g. if the SSL certificate's subject doesn't match the domain, the URL ping test will still pass. Sometimes if the SSL certificate expires, I'd like the URL Ping test fails so I can get the notification about it, because the end users will get the error when they access the URL with web browser.
Please Do consider it.7 votes
We are currently doing work on our backend to make this possible to implement. This should be available mid-year 2019.
While some applications have specific requirements, a lot of reports that come out of analystics must be pretty common. It would be nice to have an área in which to find common queries already optimized and 'verified' by the community and/or Microsoft itself.
Queries like: "between two dates, which are the pages that had most time consumption difference"7 votes
We’re currently planning a feature that will expose a repo of community-shared queries, which we think will answer this need as well.
The repo itself is available and open today at https://github.com/MicrosoftDocs/LogAnalyticsExamples
Will update more as planning continues,
Currently, Application Insights is part of Azure Monitor. However, Availability tests and other Application Insights are not included in the Azure Monitor service tag, so administrators must instead currently use the IP addresses listed at: For now, the only way to address this would be using the IPs at: https://docs.microsoft.com/en-us/azure/azure-monitor/app/ip-addresses and subscribing to the RSS feed: https://github.com/MicrosoftDocs/azure-docs/commits/master/articles/azure-monitor/app/ip-addresses.md.atom.2 votes
We are working on getting this implemented, should be available by the 2nd half of 2019.
rather than opening a new analytics window each time i hit the analytics button, it would be cleaner to open a new tab, if the window is already open...2 votes
As we’re dealing with the integration of the Analytics portal into Log Analytics as well as moving the portal into Azure, implementation of this item is put on hold and re-evaluated.
Azure Monitor has a service tag that can be applied to an NSG - does the Application Insights webtest ips fall into this range? If not, can you add those? Its tedious updating IP list every time.1 vote
We are looking into adding an additional service tag for Application Insights Availability tests. This would not be shared with the Azure Monitor service tag. We expect this to be complete by the end of Sept 2019.
For SmartDetection alerts, it would be ideal if alerts like the LongRunningDependancy alert ran more often than once a day1 vote
Thank you for the feedback!
This is on our backlog, although currently there’s no ETA we can share for it. We’ll update back when there’s a more concrete date we can share.
When editing a rule in "Smart Detection settings", you can only choose between email and webhooks as a notification option.
It would be nice to utilise existing action groups configured within Azure monitor.1 vote
Thank you for reaching out.
Integration with action groups will become supported for the “Failure Anomalies” detection rule in the coming weeks, as part of the transition from classic alerts (more info here: https://docs.microsoft.com/en-us/azure/azure-monitor/platform/monitoring-classic-retirement).
Action groups support for the other Smart Detection rules is also in our backlog, but there’s no ETA for this yet.
- Don't see your idea?