History of breaking changes
Note
This section is for changes that are not yet released but will affect future releases.
Starting from 0.9.7-beta112
Configuration changes
Added the following App Configuration value:
Name | Default value | Description |
---|---|---|
FoundationaLLM:APIEndpoints:DataPipelineAPI:Essentials:APIKey |
Points to foundationallm-apiendpoints-datapipelineapi-apikey |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:DataPipelineAPI:Essentials:AppInsightsConnectionString |
Points to foundationallm-appinsights-connectionstring |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:DataPipelineFrontendWorker:Essentials:APIKey |
Points to foundationallm-apiendpoints-datapipelinefrontendworker-apikey |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:DataPipelineFrontendWorker:Essentials:AppInsightsConnectionString |
Points to foundationallm-appinsights-connectionstring |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:DataPipelineBackendWorker:Essentials:APIKey |
Points to foundationallm-apiendpoints-datapipelinebackendworker-apikey |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:DataPipelineBackendWorker:Essentials:AppInsightsConnectionString |
Points to foundationallm-appinsights-connectionstring |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:ContextAPI:Essentials:APIKey |
Points to foundationallm-apiendpoints-contextapi-apikey |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:ContextAPI:Essentials:AppInsightsConnectionString |
Points to foundationallm-appinsights-connectionstring |
KeyVault reference value pointing to the specified secret. |
FoundationaLLM:APIEndpoints:ContextAPI:Configuration:FileService:Storage:AccountName |
<context_api_file_storage_account_name> |
The name of the dedicated storage account used by the FoundationaLLM Context API file service. |
FoundationaLLM:APIEndpoints:ContextAPI:Configuration:FileService:Storage:AuthenticationType |
AzureIdentity |
The type of authentication used by the FoundationaLLM Context API file service to connect to the dedicated storage account. |
FoundationaLLM:APIEndpoints:ContextAPI:Configuration:FileService:CosmosDB:Endpoint |
<cosmos_db_endpoint> |
The endpoint URL of the Azure Cosmos DB. |
FoundationaLLM:APIEndpoints:ContextAPI:Configuration:FileService:CosmosDB:Database |
database |
The Azure Cosmos DB database name. |
FoundationaLLM:APIEndpoints:ContextAPI:Configuration:FileService:CosmosDB:Containers |
Context |
The list of Azure CosmosDB containers used by the Context API file service. |
Important
A dedicated storage account for the FoundationaLLM Context API must be created. The account should be isolated in a dedicated resource group and permissions should only be granted to the FoundationaLLM Context API managed identity. The account should be configured the same way the main FoundationaLLM storage account is. A new storage container with a name equal to the FoundationaLLM instance identifier must be created in the storage account.
Important
A new Azure Cosmos DB container named Context
must be created with a parition key of /upn
and an autoscale transactional throughput of maximum 4000 RU/s.
Important
A new Azure Container Apps Session Pool must be created with in the same resource groups as the Context API storage account. Network egress should be disabled.
The FoundationaLLM:Code:CodeExecution:AzureContainerAppsDynamicSessions
must be set to the following value:
{"DynamicSessionsEndpoints": [
"<session_pool_endpoint>"
]}
where <session_pool_endpoint>
is the endpoint of the Azure Container Apps Session Pool.
Role assignment changes
The following role assignments must be added to the Context API's Managed Identity:
Name | Target |
---|---|
App Configuration Data Reader |
Azure App Configuration service. |
Key Vault Secrets User |
Azure Key Vault service. |
Storage Blob Data Contributor |
Dedicated storage account used by the FoundationaLLM Context API. |
Cosmos DB Built-in Data Contributor |
Azure Cosmos DB account used by the FoundationaLLM Context API. |
Azure ContainerApps Session Executor |
Azure Container Apps Session Pool. |
The following role assignments must be added to the LangChain API's Managed Identity:
Name | Target |
---|---|
Azure ContainerApps Session Executor |
Azure Container Apps Session Pool. |
The following role assignments must be added to the Semantic Kernel API's Managed Identity:
Name | Target |
---|---|
Azure ContainerApps Session Executor |
Azure Container Apps Session Pool. |
Starting from 0.9.7-beta107
For External Agent Workflows, the workflow invokation now includes conversation file history. The complete file history is passed regardless of conversation history settings.
The signature is now as follows:
async def invoke_async(self,
operation_id: str,
user_prompt: str,
user_prompt_rewrite: Optional[str],
message_history: List[MessageHistoryItem],
file_history: List[FileHistoryItem])-> CompletionResponse:
Starting from 0.9.7-beta106
For External Agent Workflows, the invocation of the workflow now sends the completion request MessageHistoryItem list vs the translated LangChain BaseMessage construct. This way workflows have more control on how to handle the message history of a conversation.
Starting from 0.9.7-beta105
Configuration changes
The FoundationaLLM.Common.Models.ResourceProviders.Agent.AgentTool
definition now contains a ClassName
property. This should be set to the implementation class name of the tool. The Name
property of the tool is what will be used for uniqueness in the case multipe tools of the same type/class are used in the same agent.
Note: This is not a breaking change as if the
ClassName
property is not set, theName
property will be used as the class name which is the existing pattern. However, it is recommended to set theClassName
property to adhere to the new pattern.
Agent configuration tools
property is impacted as follows:
Old pattern sample:
{
"name": "DALLEImageGeneration",
"description": "Generates an image based on a prompt.",
"package_name": "FoundationaLLM",
"resource_object_ids": {
"/instances/8ac6074c-bdde-43cb-a140-ec0002d96d2b/providers/FoundationaLLM.AIModel/aiModels/DALLE3Model": {
"object_id": "/instances/8ac6074c-bdde-43cb-a140-ec0002d96d2b/providers/FoundationaLLM.AIModel/aiModels/DALLE3Model",
"properties": {
"object_role": "main_model",
"model_parameters": {}
}
}
},
"properties": {}
}
New pattern:
{
"name": "DALLETool1",
"description": "Generates an image based on a prompt.",
"package_name": "FoundationaLLM",
"class_name": "DALLEImageGenerationTool",
"resource_object_ids": {
"/instances/8ac6074c-bdde-43cb-a140-ec0002d96d2b/providers/FoundationaLLM.AIModel/aiModels/DALLE3Model": {
"object_id": "/instances/8ac6074c-bdde-43cb-a140-ec0002d96d2b/providers/FoundationaLLM.AIModel/aiModels/DALLE3Model",
"properties": {
"object_role": "main_model",
"model_parameters": {}
}
}
},
"properties": {}
}
Starting from 0.9.7-beta103
Configuration changes
Added the following App Configuration value:
Name | Default value | Description |
---|---|---|
FoundationaLLM:Quota:Storage:AccountName |
<storage_account_name> |
Provides the storage account used by the FoundationaLLM quota management service. |
FoundationaLLM:Quota:Storage:AuthenticationType |
AzureIdentity |
Indicates the authentication type used by the FoundationaLLM quota management service to connect to the storage account. |
A new container named quota
must be created in the default storage account.
The quota definitions are stored in the quota
container in a file named quota-store.json
. If the file does not exist, the file is automatically created. The file contains a list of quota definitions with the following structure:
{
"name": "TestAPI01CompletionsUPNRawRequestRateLimit",
"description": "Defines a per UPN raw request rate limit on the TestAPI01 Completions controller.",
"context": "TestAPI01:Completions",
"type": "RawRequestRateLimit",
"metric_partition": "UserPrincipalName",
"metric_limit": 120,
"metric_window_seconds": 60,
"lockout_duration_seconds": 60,
"distributed_enforcement": false
}
The following table provides details about the quota definition properties:
Name | Description | Notes |
---|---|---|
name |
The name of the quota definition. | |
description |
A description of the quota definition. | |
context |
The context of the quota definition. | The format of the context is <service_name>:<controller_name> or <service_name>:<controller_name>:<agent_name> . Currently the following contexts can be used: CoreAPI:Completions , CoreAPI:Completions:<agent_name> where <agent_name> must be a valid agent name. |
type |
The type of the quota enforcement applied. | The following types are supported: RawRequestRateLimit and AgentRequestRateLimit . RawRequestRateLimt defines the quota metric to be raw API requests and requires a context of <service_name>:<controller_name> . AgentRequestRateLimit defines the quota metric to be agent completion requests and requires a context of <service_name>:<controller_name>:<agent_name> . |
metric_partition |
The metric partition used to enforce the quota. | The following partitions are supported: None (the metric is not partitioned) UserPrincipalName (the metric is partitioned by user principal name) and UserIdentifier (the metric is partitioned by user identifier). |
metric_limit |
The limit of the metric. | The limit is enforced over the metric_window_seconds . In the example above, a maximum number of 120 raw API requests are allowed per user principal name in a 60-second window. |
metric_window_seconds |
The time window in seconds over which the limit is enforced. | In the example above, a maximum number of 120 raw API requests are allowed per user principal name in a 60-second window. |
lockout_duration_seconds |
The duration in seconds for which the caller is locked out after exceeding the quota. | The lockout duration is applied after the user exceeds the quota limit. The user is locked out for the specified duration before the quota is reset. |
distributed_enforcement |
Indicates whether the quota is enforced across multiple instances of the same API. | If true , the quota is enforced across multiple instances. If false , the quota is enforced on a single instance. Currently, only false is supported. |
Starting from 0.9.7-beta101
Configuration changes
Added the following App Configuration value:
Name | Default value | Description |
---|---|---|
FoundationaLLM:ResourceProviders:DataPipeline:Storage:AccountName |
<storage_account_name> |
Provides the storage account used by the FoundationaLLM.DataPipeline resource provider. |
FoundationaLLM:ResourceProviders:DataPipeline:Storage:AuthenticationType |
AzureIdentity |
Indicates the authentication type used by the FoundationaLLM.DataPipeline resource provider to connect to the storage account. |
FoundationaLLM:ResourceProviders:Plugin:Storage:AccountName |
<storage_account_name> |
Provides the storage account used by the FoundationaLLM.Plugin resource provider. |
FoundationaLLM:ResourceProviders:Plugin:Storage:AuthenticationType |
AzureIdentity |
Indicates the authentication type used by the FoundationaLLM.Plugin resource provider to connect to the storage account. |
Management API
The POST /instances/{instanceId}/providers/{resourceProvider}/{resourcePath}
endpoint now supports providing a resource
form data key in the request body. This key is used to provide the serialized resource FoundationaLLM resource when a file upload is performed using a form-data
request body.
The call to POST /instances/{instanceId}/providers/FoundationaLLM.Plugin/pluginPackages/Dotnet-FoundationaLLMDataPipelinePlugins
expects a form-data
request body with the following keys:
file
(of type file) - the plugin package file to upload.resource
(of type text) - the serialized plugin package FoundationaLLM resource.
Starting with 0.9.7-beta100
Configuration changes
App configuration settings
The value of the FoundationaLLM:Events:Profiles:CoreAPI
must be updated to include the api-statistics
topic. The updated value is as follows:
{
"EventProcessingCycleSeconds": 5,
"Topics": [
{
"Name": "resource-providers",
"SubscriptionPrefix": "rp-core"
},
{
"Name": "api-statistics",
"SubscriptionPrefix": "as-core"
}
]
}
Starting with 0.9.4-rc100
Configuration changes
App configuration settings
Important
The App Config setting FoundationaLLM:Instance:EnableResourceProvidersCache
is obsolete and should be removed from the App Config settings.
The following App Config properties make cache settings for the resource providers configurable:
Name | Description | Default Value |
---|---|---|
FoundationaLLM:ResourceProvidersCache:EnableCache |
Indicates whether resource providers should cache resources or not. | true |
FoundationaLLM:ResourceProvidersCache:AbsoluteCacheExpirationSeconds |
Absolute cache expiration in seconds. | 300 |
FoundationaLLM:ResourceProvidersCache:SlidingCacheExpirationSeconds |
Sets how many seconds the cache entry can be inactive (e.g. not accessed) before it will be removed. This will not extend the entry lifetime beyond the absolute expiration (if set). | 120 |
FoundationaLLM:ResourceProvidersCache:CacheSizeLimit |
The maximum number of items that can be stored in the cache. | 10000 |
FoundationaLLM:ResourceProvidersCache:CacheExpirationScanFrequencySeconds |
Gets or sets the minimum length of time between successive scans for expired items in seconds. | 30 |
Starting with 0.9.3
This version introduces the concept of a well-known virtual security group (AllAgentsVirtualSecurityGroup
) that is used by agents using Agent Access Token authentication and have their own virtual security group defined. Assign the following PBAC and RBAC roles to the AllAgentsVirtualSecurityGroup
(replace the tokens denoted by {{...}}
with the actual values):
PBAC changes
{
"name": "{{pbacConversationsOwnerGuid}}",
"type": "FoundationaLLM.Authorization/policyAssignments",
"object_id": "/providers/FoundationaLLM.Authorization/policyAssignments/{{pbacConversationsOwnerGuid}}",
"description": "Ownership on conversation resources for AllAgentsVirtualSecurityGroup by the FoundationaLLM.Conversation resource provider.",
"policy_definition_id": "/providers/FoundationaLLM.Authorization/policyDefinitions/00000000-0000-0000-0001-000000000001",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Conversation/conversations",
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": "SYSTEM",
"updated_by": "SYSTEM"
},
{
"name": "{{pbacConversationMappingsGuid}}",
"type": "FoundationaLLM.Authorization/policyAssignments",
"object_id": "/providers/FoundationaLLM.Authorization/policyAssignments/{{pbacConversationMappingsGuid}}",
"description": "Ownership on conversation mapping resources for AllAgentsVirtualSecurityGroup managed by the FoundationaLLM.AzureOpenAI resource provider.",
"policy_definition_id": "/providers/FoundationaLLM.Authorization/policyDefinitions/00000000-0000-0000-0001-000000000001",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.AzureOpenAI/conversationMappings",
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": "SYSTEM",
"updated_by": "SYSTEM"
},
{
"name": "{{pbacAttachmentsOwnerGuid}}",
"type": "FoundationaLLM.Authorization/policyAssignments",
"object_id": "/providers/FoundationaLLM.Authorization/policyAssignments/{{pbacAttachmentsOwnerGuid}}",
"description": "Ownership on attachment resources for AllAgentsVirtualSecurityGroup managed by the FoundationaLLM.Attachment resource provider.",
"policy_definition_id": "/providers/FoundationaLLM.Authorization/policyDefinitions/00000000-0000-0000-0001-000000000001",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Attachment/attachments",
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": "SYSTEM",
"updated_by": "SYSTEM"
},
{
"name": "{{pbacFileMappingsGuid}}",
"type": "FoundationaLLM.Authorization/policyAssignments",
"object_id": "/providers/FoundationaLLM.Authorization/policyAssignments/{{pbacFileMappingsGuid}}",
"description": "Ownership on file mapping resources for AllAgentsVirtualSecurityGroup managed by the FoundationaLLM.AzureOpenAI resource provider.",
"policy_definition_id": "/providers/FoundationaLLM.Authorization/policyDefinitions/00000000-0000-0000-0001-000000000001",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.AzureOpenAI/fileMappings",
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": "SYSTEM",
"updated_by": "SYSTEM"
}
RBAC changes
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{openAiAssistantsReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{openAiAssistantsReaderGuid}}",
"display_name": null,
"description": "Read Access for OpenAIAssistants for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/workflows/OpenAIAssistants",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{langGraphReactAgentReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{langGraphReactAgentReaderGuid}}",
"display_name": null,
"description": "Read Access for LangGraphReactAgent for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/workflows/LangGraphReactAgent",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{attachmentContributorGuid2}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{attachmentContributorGuid2}}",
"display_name": null,
"description": "Attachment contributor role for AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/8e77fb6a-7a78-43e1-b628-d9e2285fe25a",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{conversationContributorGuid2}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{conversationContributorGuid2}}",
"display_name": null,
"description": "Conversation contributor role for AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/d0d21b90-5317-499a-9208-3a6cb71b84f9",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{configReadAccessGuid3}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{configReadAccessGuid3}}",
"display_name": null,
"description": "Read Access for configuration for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Configuration/appConfigurations/FoundationaLLM:APIEndpoints:CoreAPI:Configuration:MaxUploadsPerMessage",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{configReadAccessGuid4}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{configReadAccessGuid4}}",
"display_name": null,
"description": "Read Access for configuration for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Configuration/appConfigurations/FoundationaLLM:APIEndpoints:CoreAPI:Configuration:CompletionResponsePollingIntervalSeconds",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{externalAgentWorkflowReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{externalAgentWorkflowReaderGuid}}",
"display_name": null,
"description": "Read Access for ExternalAgentWorkflow for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/workflows/ExternalAgentWorkflow",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{langChainExpressionLanguageReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{langChainExpressionLanguageReaderGuid}}",
"display_name": null,
"description": "Read Access for LangChainExpressionLanguage for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/workflows/LangChainExpressionLanguage",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{openAIAssistantsFileSearchReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{openAIAssistantsFileSearchReaderGuid}}",
"display_name": null,
"description": "Read Access for OpenAIAssistantsFileSearch for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/tools/OpenAIAssistantsFileSearch",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{openAIAssistantsCodeInterpreterReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{openAIAssistantsCodeInterpreterReaderGuid}}",
"display_name": null,
"description": "Read Access for OpenAIAssistantsCodeInterpreter for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/tools/OpenAIAssistantsCodeInterpreter",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{dalleImageGenerationReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{dalleImageGenerationReaderGuid}}",
"display_name": null,
"description": "Read Access for DALLEImageGeneration for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/tools/DALLEImageGeneration",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
},
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "{{foundationaLLMContentSearchToolReaderGuid}}",
"object_id": "/providers/FoundationaLLM.Authorization/roleAssignments/{{foundationaLLMContentSearchToolReaderGuid}}",
"display_name": null,
"description": "Read Access for FoundationaLLMContentSearchTool for the AllAgentsVirtualSecurityGroup group.",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/00a53e72-f66e-4c03-8f81-7e885fd2eb35",
"principal_id": "5bb493a2-5909-4771-93ba-d83b7b5a1de9",
"principal_type": "Group",
"scope": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/tools/FoundationaLLMContentSearchTool",
"properties": null,
"created_on": "{{deployTime}}",
"updated_on": "{{deployTime}}",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
}
Starting with 0.9.3-rc016
Configuration Resource Provider
The APIEnpointConfiguration
class has been updated to change the previous StatusUrl
property to StatusEndpoint
, which is a relative path to the status endpoint. By extension, the related JSON files now have a status_endpoint
property that contains the relative path. Here is the OrchestrationAPI JSON template as an example of this change:
{
"type": "api-endpoint",
"name": "OrchestrationAPI",
"object_id": "/instances/{{instanceId}}/providers/FoundationaLLM.Configuration/apiEndpointConfigurations/OrchestrationAPI",
"display_name": null,
"description": null,
"cost_center": null,
"category": "General",
"authentication_type": "APIKey",
"authentication_parameters": {
"api_key_configuration_name": "FoundationaLLM:APIEndpoints:OrchestrationAPI:Essentials:APIKey",
"api_key_header_name": "X-API-KEY"
},
"url": "http://orchestration-api.{{serviceNamespaceName}}.svc.cluster.local",
"status_endpoint": "/instances/{{instanceId}}/status",
"url_exceptions": [],
"timeout_seconds": 2400,
"retry_strategy_name": "ExponentialBackoff",
"created_on": "0001-01-01T00:00:00+00:00",
"updated_on": "0001-01-01T00:00:00+00:00",
"created_by": null,
"updated_by": "SYSTEM",
"deleted": false
}
The status path is used by the Management Portal's Deployment Information page to show the status of each of the APIs. This path is also used by the /Orchestration/Services/LangChainService
and /Orchestration/Services/SemanticKernelService
classes to check the status of the respective APIs.
Important
All files within the /resource-provider/FoundationaLLM.Configuration
directory must be updated to change the name of the status_url
field to status_endpoint
and change the value to a relative path as needed.
Vectorization resource provider changes
Vectorization indexing and partitioning profile settings dictionary keys are now persisted as snake case (ex. IndexName
becomes index_name
).
Agent resource provider changes
Deployment notes
- Ensure the feature flag is enabled for
FoundationaLLM.Agent.PrivateStore
if using the private store feature on OpenAI Assistants workflow agents is desired. - Open existing
OpenAIAssistantsWorkflow
agents in the Management portal and selectSave
to populate the global vector store in the OpenAI service for the assistant.
Agent file resources
The agent file references are now stored in a new Cosmos DB container, while the file contents are stored in the storage account. Here are the configuration parameters for the required Cosmos DB container:
Name | Value |
---|---|
Name | Agents |
Maximum RU/s | 4000 |
Hierarchical Partition key | /instanceId + /agentName |
As a result of the migration, the newly created Agents
container will initially contain only ony type of times: AgentFileReference
.
This is an example of such item:
{
"instanceId": "8ac6074c-bdde-43cb-a140-ec0002d96d2b",
"agentName": "TestAgentFiles1",
"originalFilename": "curious_cat_story.pdf",
"contentType": "application/pdf",
"size": 2433,
"upn": "andrei@foundationaLLM.ai",
"id": "af-0285ddb8-a5b8-48b0-8248-bd0ad2f123bf",
"objectId": "/instances/8ac6074c-bdde-43cb-a140-ec0002d96d2b/providers/FoundationaLLM.Agent/agents/TestAgentFiles1/agentFiles/af-0285ddb8-a5b8-48b0-8248-bd0ad2f123bf",
"name": "af-0285ddb8-a5b8-48b0-8248-bd0ad2f123bf",
"filename": "/FoundationaLLM.Agent/8ac6074c-bdde-43cb-a140-ec0002d96d2b/TestAgentFiles1/private-file-store/af-0285ddb8-a5b8-48b0-8248-bd0ad2f123bf.pdf",
"type": "agent-file",
"deleted": false,
"_rid": "ie9IAMu0+b0EAAAAAAAAAA==",
"_self": "dbs/ie9IAA==/colls/ie9IAMu0+b0=/docs/ie9IAMu0+b0EAAAAAAAAAA==/",
"_etag": "\"37012abc-0000-0200-0000-67afaa800000\"",
"_attachments": "attachments/",
"_ts": 1739565696
}
The agent-file
type has been removed and the references are no longer saved in the agent reference store _resource-references.json
.
Tools
In the agent resource provider storage folder (resource-provider/FoundationaLLM.Agent
), add a tool
resource reference entry (_resource_references.json
) as well as configuration file for the following tools: OpenAIAssistantsFileSearch
, OpenAIAssistantsCodeInterpreter
, DALLEImageGeneration
, and FoundationaLLMContentSearchTool
.
Reference example:
{
"Name": "OpenAIAssistantsFileSearch",
"Filename": "/FoundationaLLM.Agent/OpenAIAssistantsFileSearch.json",
"Type": "tool",
"Deleted": false
}
File example:
{
"type": "tool",
"name": "OpenAIAssistantsFileSearch",
"object_id": "/instances/{{instanceId}}/providers/FoundationaLLM.Agent/tools/OpenAIAssistantsFileSearch",
"display_name": "OpenAIAssistantsFileSearch",
"description": "OpenAIAssistantsFileSearch",
"cost_center": null,
"properties": null,
"created_on": "2025-01-10T08:22:34.2682433+00:00",
"updated_on": "0001-01-01T00:00:00+00:00",
"created_by": "dev@foundationaLLM.ai",
"updated_by": null,
"deleted": false,
"expiration_date": null
}
Starting with 0.9.3-rc010
Resource provider cache warm-up
Resource providers now support a cache warm-up mechanism. This mechanism allows the cache to be pre-populated with the resource provider data before the service starts processing requests. This feature is useful when the service is deployed in a cold environment and needs to be warmed up before it can handle requests.
The cache warm-up mechanism is enabled when a file named _cache_warmup.json
exists in the blob storage location associated with the resource provider. Here is an example of such a file:
[
{
"ServiceName": "OrchestrationAPI",
"Description": "Resources required by: service principal x, service principal y.",
"ResourceObjectIds": [
"/instances/73fad442-.../providers/FoundationaLLM.Configuration/apiEndpointConfigurations/GatewayAPI",
"/instances/73fad442-.../providers/FoundationaLLM.Configuration/apiEndpointConfigurations/AzureAISearch",
"/instances/73fad442-.../providers/FoundationaLLM.Configuration/apiEndpointConfigurations/LangChainAPI",
"/instances/73fad442-.../providers/FoundationaLLM.Configuration/apiEndpointConfigurations/StateAPI"
],
"SecurityPrincipalIds": [
"4150c6b3-...",
"949195b1-..."
]
},
{
"ServiceName": "OrchestrationAPI",
"Description": "Resources required by: service principal x, service principal y, service principal z.",
"ResourceObjectIds": [
"/instances/73fad442-.../providers/FoundationaLLM.Configuration/apiEndpointConfigurations/AzureOpenAI"
],
"SecurityPrincipalIds": [
"4150c6b3-...",
"949195b1-...",
"d6a6317a-..."
]
}
]
The configuration contains an array of objects, each representing a cache warm-up configuration. Each object contains the following properties:
ServiceName
- The name of the service that the cache warm-up configuration is for.Description
- A description of the cache warm-up configuration.ResourceObjectIds
- The list of resource object identifiers that will be pre-loaded into the resource provider cache.Note
The resource object identifiers must be specific to the resource provider.
SecurityPrincipalIds
- The list of security principal identifiers that will be used to authenticate the cache warm-up requests.Important
As a result of the cache warm-up process, the client authorization cache will be populated with all combinations of security principal and resource object identifiers that exist in the cache warm-up configuration. Make sure the two lists only contain the necessary values to avoid a long startup time for the resource provider.
Starting with 0.9.3-rc002
App configuration settings
The following App Config properties make cache settings for the AuthorizationServiceClientCacheService
configurable:
Name | Description | Default Value |
---|---|---|
FoundationaLLM:APIEndpoints:AuthorizationAPI:Essentials:EnableCache |
Indicates whether calls to the Authorization API should be cached or not. | false |
FoundationaLLM:APIEndpoints:AuthorizationAPI:Essentials:AbsoluteCacheExpirationSeconds |
Absolute cache expiration in seconds. | 300 |
FoundationaLLM:APIEndpoints:AuthorizationAPI:Essentials:SlidingCacheExpirationSeconds |
Sets how many seconds the cache entry can be inactive (e.g. not accessed) before it will be removed. This will not extend the entry lifetime beyond the absolute expiration (if set). | 120 |
FoundationaLLM:APIEndpoints:AuthorizationAPI:Essentials:CacheSizeLimit |
The maximum number of items that can be stored in the cache. | 10000 |
FoundationaLLM:APIEndpoints:AuthorizationAPI:Essentials:CacheExpirationScanFrequencySeconds |
Gets or sets the minimum length of time between successive scans for expired items in seconds. | 30 |
Starting with 0.9.2-rc005
Agent configuration changes
Starting with this version, all agents MUST transition to the agent workflow configuraiton approach.
The following agent properties are no longer supported and should be deleted as part of upgrading to this version:
OrchestrationSettings
- fully replaced by the agent worflow settings.PromptObjectId
- replaced by the agent workflow resource object identifier with anobject_role
ofmain_prompt
.AIModelObjectId
- replaced by the agent workflow resource object identifier with anobject_role
ofmain_model
.Capabilities
- removed. The equivalent of having Azure OpenAI Assistants capabilities is having an agent workflow with the typeazure-openai-assistants-workflow
.Azure.OpenAI.Assistant.Id
property inproperties
- replaced by theassistant_id
property of an agent workflow witht the typeazure-openai-assistants-workflow
.
Important
If the Azure.OpenAI.Assistant.Id
property is set in the agent properties, it's value must be copied to the assistant_id
property of the agent workflow.
Here is an example of a fully configured worfklow section for an agent:
{
"type": "azure-openai-assistants-workflow",
"name": "OpenAIAssistants",
"package_name": "FoundationaLLM",
"assistant_id": "asst_...",
"resource_object_ids": {
"/instances/.../providers/FoundationaLLM.Agent/workflows/OpenAIAssistants": {
"object_id": "/instances/.../providers/FoundationaLLM.Agent/workflows/OpenAIAssistants",
"properties": {}
},
"/instances/.../providers/FoundationaLLM.AIModel/aiModels/GPT4oMiniCompletionAIModel" : {
"object_id": "/instances/.../providers/FoundationaLLM.AIModel/aiModels/GPT4oMiniCompletionAIModel",
"properties": {
"object_role": "main_model",
"model_parameters": {}
}
},
"/instances/.../providers/FoundationaLLM.Prompt/prompts/FoundationaLLM-mini": {
"object_id": "/instances/.../providers/FoundationaLLM.Prompt/prompts/FoundationaLLM-mini",
"properties": {
"object_role": "main_prompt"
}
}
}
}
Starting from 0.9.1
App configuration settings
To support the event grid infrastructure, the following new App Configuration settings are required.
[
{
"key": "FoundationaLLM:Events:Profiles:CoreAPI",
"label": null,
"value": "{\"EventProcessingCycleSeconds\": 5,\"Topics\": [{\"Name\": \"resource-providers\",\"SubscriptionPrefix\": \"rp-core\"}]}",
"content_type": "application/json",
"tags": {}
},
{
"key": "FoundationaLLM:Events:Profiles:GatekeeperAPI",
"label": null,
"value": "{\"EventProcessingCycleSeconds\":60,\"Topics\":[]}",
"content_type": "application/json",
"tags": {}
},
{
"key": "FoundationaLLM:Events:Profiles:GatewayAPI",
"label": null,
"value": "{\"EventProcessingCycleSeconds\": 5,\"Topics\": [{\"Name\": \"resource-providers\",\"SubscriptionPrefix\": \"rp-gateway\"}]}",
"content_type": "application/json",
"tags": {}
},
{
"key": "FoundationaLLM:Events:Profiles:ManagementAPI",
"label": null,
"value": "{\"EventProcessingCycleSeconds\": 5,\"Topics\": [{\"Name\": \"resource-providers\",\"SubscriptionPrefix\": \"rp-management\"}]}",
"content_type": "application/json",
"tags": {}
},
{
"key": "FoundationaLLM:Events:Profiles:OrchestrationAPI",
"label": null,
"value": "{\"EventProcessingCycleSeconds\": 5,\"Topics\": [{\"Name\": \"resource-providers\",\"SubscriptionPrefix\": \"rp-orch\"}]}",
"content_type": "application/json",
"tags": {}
},
{
"key": "FoundationaLLM:Events:Profiles:VectorizationAPI",
"label": null,
"value": "{\"EventProcessingCycleSeconds\":60,\"Topics\":[]}",
"content_type": "application/json",
"tags": {}
},
{
"key": "FoundationaLLM:Events:Profiles:VectorizationWorker",
"label": null,
"value": "{\"EventProcessingCycleSeconds\":60,\"Topics\":[]}",
"content_type": "application/json",
"tags": {}
}
]
Note: The event grid system topics need to be removed.
The following topic needs to be created in the event grid namespace, must have a resource-providers
topic with a publisher type of Custom
and an input schema of Cloud Events v1.0
.
Configuration changes
Added the following App Configuration value:
Name | Default value | Description |
---|---|---|
FoundationaLLM:UserPortal:Authentication:Entra:TimeoutInMinutes |
60 |
The timeout in minutes for a user's auth token in the User Portal. |
FoundationaLLM:UserPortal:Configuration:ShowFileUpload |
true |
Global setting to determine if file upload is allowed on chat messages. |
Starting with 0.9.1-rc117
Agent configuration changes
"text_rewrite_settings": {
"user_prompt_rewrite_enabled" : true,
"user_prompt_rewrite_settings": {
"user_prompt_rewrite_ai_model_object_id": "/instances/73fad442-f614-4510-811f-414cb3a3d34b/providers/FoundationaLLM.AIModel/aiModels/GPT4oCompletionAIModel",
"user_prompt_rewrite_prompt_object_id": "/instances/73fad442-f614-4510-811f-414cb3a3d34b/providers/FoundationaLLM.Prompt/prompts/FoundationaLLM-v2-Rewrite",
"user_prompts_window_size": 1
}
},
"cache_settings": {
"semantic_cache_enabled": true,
"semantic_cache_settings": {
"embedding_ai_model_object_id": "/instances/73fad442-f614-4510-811f-414cb3a3d34b/providers/FoundationaLLM.AIModel/aiModels/DefaultEmbeddingAIModel",
"embedding_dimensions": 2048,
"minimum_similarity_threshold": 0.975
}
},
Semantic cache
Enable vector search in the Cosmos DB database using the following CLI command:
az cosmosdb update --resource-group <resource-group-name> --name <account-name> --capabilities EnableNoSQLVectorSearch
Create the CompletionsCache
container in the Cosmos DB database with the following properties:
- Container id:
CompletionsCache
- Partition key:
/operationId
- Container Vector Policy: a policy with the following properties:
- Path:
/userPromptEmbedding
- Data type:
float32
- Distance function:
Cosine
- Dimensions: 2048
- Index type:
diskANN
(leave the default values)
- Path:
After the container is created, set the Time to Live
property on the container to 300 seconds.
Starting with 0.9.1-rc105
Configuration changes
The following new App Configuration settings are required:
Name | Default value | Description |
---|---|---|
FoundationaLLM:PythonSDK:Logging:LogLevel:Azure |
Warning |
Provides the default level of logging for Azure modules in the Python SDK. |
Agent workflow configuration changes
Agent resource configuration files that have a workflow
property now requires a name
and package_name
property. This is to support loading external workflows via plugins. For internal workflows, the package_name
should be set to FoundationaLLM
. Example below truncated for brevity.
{
"workflow": {
"type": "langgraph-react-agent-workflow",
"name": "LangGraphReactAgent",
"package_name": "FoundationaLLM",
"workflow_host": "LangChain",
"graph_recursion_limit": 10,
"resource_object_ids": {}
}
}
A new Workflow
resource must be added to the FoundationaLLM.Agent
resource provider:
{
"type": "external-agent-workflow",
"name": "ExternalAgentWorkflow",
"object_id": "/instances/<instance_id>/providers/FoundationaLLM.Agent/workflows/ExternalAgentWorkflow",
"display_name": "ExternalAgentWorkflow",
"description": "External Agent workflow",
"cost_center": null,
"properties": null,
"created_on": "2024-11-13T18:12:07.0223039+00:00",
"updated_on": "0001-01-01T00:00:00+00:00",
"created_by": "dev@foundationaLLM.ai",
"updated_by": null,
"deleted": false,
"expiration_date": null
}
Starting with 0.9.1-rc102
Configuration changes
The following new App Configuration settings are required:
Name | Default value | Description |
---|---|---|
FoundationaLLM:APIEndpoints:OrchestrationAPI:Configuration:CompletionRequestsStorage:AccountName |
<main_storage_account_name> |
Provides the storage account used by the Orchestration API to persist completion requests. |
FoundationaLLM:APIEndpoints:OrchestrationAPI:Configuration:CompletionRequestsStorage:AuthenticationType |
AzureIdentity |
Indicates that managed identity authentication should be used to access the storage account. |
FoundationaLLM:APIEndpoints:OrchestrationAPI:Configuration:CompletionRequestsStorage:ContainerName |
orchestration-completion-requests |
Provides the storage container name used by the Orchestration API to persist completion requests. Should always be orchestration-completion-requests |
User profile changes
A new flag named persistOrchestrationCompletionRequests
is added to the user profile. This flag is used to determine whether the user's completion requests should be persisted in the storage account. The default value is false
.
Sample configuration:
"flags": {
"oneDriveWorkSchoolEnabled": true,
"persistOrchestrationCompletionRequests": true
},
Starting with 0.9.1-rc101
Configuration changes
The following new App Configuration settings are required:
Name | Default value | Description |
---|---|---|
FoundationaLLM:Code:CodeExecution:AzureContainerAppsDynamicSessions |
{"DynamicSessionsEndpoints": []} |
Provides the configuration for the Azure Container Apps Dynamic Sessions code execution service. DynamicSessionsEnpoints is a list of Dynamic Sessions endpoints that are used to run code execution sessions. Must contain at least one value. |
Agent tool configuration changes
Each agent tool should have an entry in the properties
dictionary named foundationallm_aca_code_execution_enabled
(true
or false
) to indicate whether the tool requires code execution sessions based on the the Azure Container Apps Dynamic Sessions service.
Prompt definition changes
Prompt prefixes and suffixes support FoundationaLLM variables for dynamic replacement at runtime. The variable format is {{foundationallm:variable_name[:format]}}
where
variable_name
is the name of the well-known variable.format
is the optional formatting applied to the value of the variable.
The following variables are supported:
Name | Value | Example |
---|---|---|
current_datetime_utc |
The current UTC date and time. | The current date is {{foundationallm:current_datetime_utc:dddd, MMMM dd, yyyy}}. This looks great. -> The current date is Sunday, December 15, 2024. This looks great. |
Starting with 0.9.0
Configuration changes
The following new App Configuration settings are required:
Name | Default value | Description |
---|---|---|
FoundationaLLM:PythonSDK:Logging:LogLevel:Default |
Information |
- |
FoundationaLLM:PythonSDK:Logging:EnableConsoleLogging |
false |
- |
FoundationaLLM:APIEndpoints:CoreAPI:Configuration:Entra:RequireScopes |
true |
Indicates whether a scope claim (scp) is required for authorization. Set to false to allow authentication from an external proxy API. |
FoundationaLLM:APIEndpoints:CoreAPI:Configuration:Entra:AllowACLAuthorization |
false |
Indicates whether tokens that do not have either of the "scp" or "roles" claims are accepted (True means they are accepted). Set to true to allow authentication from an external proxy API. |
FoundationaLLM:APIEndpoints:LangChainAPI:Configuration:ExternalModules:Storage:AccountName |
- |
- |
FoundationaLLM:APIEndpoints:LangChainAPI:Configuration:ExternalModules:Storage:AuthenticationType |
- |
- |
FoundationaLLM:APIEndpoints:LangChainAPI:Configuration:ExternalModules:RootStorageContainer |
- |
- |
FoundationaLLM:APIEndpoints:LangChainAPI:Configuration:ExternalModules:Modules |
- |
- |
FoundationaLLM:APIEndpoints:LangChainAPI:Configuration:PollingIntervalSeconds |
10 |
The interval in seconds at which the LangChain API will be polled for status. |
FoundationaLLM:UserPortal:Configuration:ShowMessageRating |
true |
If true , rating options on agent messages will appear. |
FoundationaLLM:UserPortal:Configuration:ShowLastConversationOnStartup |
false |
If true , the last conversation will be displayed when the user logs in. Otherwise, a new conversation placeholder appears on page load. |
FoundationaLLM:UserPortal:Configuration:ShowMessageTokens |
true |
If true , the number of consumed tokens on agent and user messages will appear. |
FoundationaLLM:UserPortal:Configuration:ShowViewPrompt |
true |
If true , the "View Prompt" button on agent messages will appear. |
FoundationaLLM:Instance:EnableResourceProvidersCache |
false |
If true , the caching of resource providers will be enabled. |
FoundationaLLM:APIEndpoints:AuthorizationAPI:Essentials:EnableCache |
false |
If true , the caching of authorization call results will be enabled. |
Agent Tool configuration changes
Agent tools are now an array of AgentTool objects rather than a dictionary.
When defining tools for an agent, each tool now requires a package_name
property. This property is used to identify the package that contains the tool's implementation. If the tool is internal, the package_name
should be set to FoundationaLLM
, if the tool is external, the package_name
should be set to the name of the external package.
Security-related changes
The Authorization API now requires the ability to write to the Key Vault account contained within the auth resource group. Currently, the Authorization APIs managed identity is assigned to the Key Vault Secrets User
role on the Key Vault account. This role assignment must be updated to include the Key Vault Secrets Officer
role in addition to the user role.
Renamed classes
The following classes have been renamed:
Original Class | New Class |
---|---|
FoundationaLLM.Common.Models.Orchestration.Response.Citation |
FoundationaLLM.Common.Models.Orchestration.Response.ContentArtifact |
API endpoint changes
Core API
The /instances/{instanceId}/sessions/{sessionId}/message/{id}/rate
endpoint has been updated to accept the rating in the message body, rather than as a query parameter. Send the following payload in the request body:
{
"rating": true,
"comments": "string"
}
Note
Please note that both properties are nullable. Set them to null to clear out the rating and comments.
Starting with 0.8.4
Configuration changes
The following new App Configuration settings are required:
Name | Default value |
---|---|
FoundationaLLM:APIEndpoints:ManagementAPI:Configuration:AllowedUploadFileExtensions |
c, cpp, cs, css, csv, doc, docx, gif, html, java, jpeg, jpg, js, json, md, pdf, php, png, pptx, py, rb, sh, tar, tex, ts, txt, xlsx, xml, zip |
FoundationaLLM:Branding:NoAgentsMessage |
No agents available. Please check with your system administrator for assistance. |
FoundationaLLM:Branding:DefaultAgentWelcomeMessage |
Start the conversation using the text box below. |
The following new App Configuration feature flags are required:
Name | Default value |
---|---|
FoundationaLLM.Agent.PrivateStore |
Not enabled |
Assistants API enabled Agent(s)
Important
Any existing agent that has the Assistants API enabled needs to be saved from the Management UI to update itself.
Resource provider changes
FoundationaLLM.Authorization
The following entries need to be added to the policy store file:
{
"name": "GUID03",
"type": "FoundationaLLM.Authorization/policyAssignments",
"object_id": "/providers/FoundationaLLM.Authorization/policyAssignments/GUID03",
"description": "Ownership on conversation mapping resources managed by the FoundationaLLM.AzureOpenAI resource provider.",
"policy_definition_id": "/providers/FoundationaLLM.Authorization/policyDefinitions/00000000-0000-0000-0001-000000000001",
"principal_id": "SECURITY_GROUP_ID",
"principal_type": "Group",
"scope": "/instances/FOUNDATIONALLM_INSTANCEID/providers/FoundationaLLM.AzureOpenAI/conversationMappings",
"created_on": "DEPLOY_TIME",
"updated_on": "DEPLOY_TIME",
"created_by": "SYSTEM",
"updated_by": "SYSTEM"
},
{
"name": "GUID04",
"type": "FoundationaLLM.Authorization/policyAssignments",
"object_id": "/providers/FoundationaLLM.Authorization/policyAssignments/GUID04",
"description": "Ownership on file mapping resources managed by the FoundationaLLM.AzureOpenAI resource provider.",
"policy_definition_id": "/providers/FoundationaLLM.Authorization/policyDefinitions/00000000-0000-0000-0001-000000000001",
"principal_id": "SECURITY_GROUP_ID",
"principal_type": "Group",
"scope": "/instances/FOUNDATIONALLM_INSTANCEID/providers/FoundationaLLM.AzureOpenAI/fileMappings",
"created_on": "DEPLOY_TIME",
"updated_on": "DEPLOY_TIME",
"created_by": "SYSTEM",
"updated_by": "SYSTEM"
}
The following placehoders need to be replaced with the actual values:
SECURITY_GROUP_ID
- the ID of the security group that needs to be assigned to the policyFOUNDATIONALLM_INSTANCEID
- the ID of the FoundationaLLM instanceDEPLOY_TIME
- the time when the policy was deployedGUID03
andGUID04
- unique identifiers for the policy assignments
FoundationaLLM.AzureOpenAI
The assistant and file user context artifacts are now simplified and stored in a new Cosmos DB container. Here are the configuration parameters for the new Cosmos DB container:
Name | Value |
---|---|
Name | ExternalResources |
Maximum RU/s | 1000 |
Time to live | Off |
Partition key | /partitionKey |
Part of the upgrade to this version is to migrate the existing assistant and file user context artifacts to the new Cosmos DB container. Refer to the dedicated upgrade tool for instructions on how to perform this update.
As a result of the migration, the newly created ExternalResources
container will contain two types of items: AzureOpenAIConversationMapping
and AzureOpenAIFileMapping
.
This is an example of an AzureOpenAIConversationMapping
item:
{
"conversationId": "0e56a170-5355-...",
"openAIAssistantsAssistantId": "asst_kc...",
"openAIAssistantsThreadId": "thread_73...",
"openAIAssistantsThreadCreatedOn": "2024-10-14T17:57:10.510345+00:00",
"openAIVectorStoreId": "vs_X6...",
"openAIVectorStoreCreatedOn": null,
"type": "AzureOpenAIConversationMapping",
"id": "0e56a170-5355-...",
"partitionKey": "...-73fad442-f614-4510-811f-414cb3a3d34b",
"upn": "jackthecat@foundationaLLM.ai",
"instanceId": "73fad442-f614-4510-811f-414cb3a3d34b",
"openAIEndpoint": "https://openai-....openai.azure.com/",
"objectId": null,
"displayName": null,
"description": null,
"costCenter": null,
"properties": null,
"createdOn": "0001-01-01T00:00:00+00:00",
"updatedOn": "0001-01-01T00:00:00+00:00",
"createdBy": null,
"updatedBy": null,
"deleted": false,
"expirationDate": null,
"name": "0e56a170-5355-...",
"_rid": "J2BUAKktW41bAAAAAAAAAA==",
"_self": "dbs/J2BUAA==/colls/J2BUAKktW40=/docs/J2BUAKktW41bAAAAAAAAAA==/",
"_etag": "\"8702b793-0000-0200-0000-672a60b90000\"",
"_attachments": "attachments/",
"_ts": 1730830521
}
This is an example of an AzureOpenAIFileMapping
item:
{
"fileObjectId": "/instances/73fad442-f614-4510-811f-414cb3a3d34b/providers/FoundationaLLM.Attachment/attachments/a-f8...",
"originalFileName": "some_file.csv",
"fileContentType": "text/csv",
"fileRequiresVectorization": false,
"openAIFileId": "assistant-8G...",
"openAIFileUploadedOn": "2024-10-14T23:01:02.3075592+00:00",
"openAIAssistantsFileGeneratedOn": null,
"openAIVectorStoreId": null,
"type": "AzureOpenAIFileMapping",
"id": "assistant-8G...",
"partitionKey": "...-73fad442-f614-4510-811f-414cb3a3d34b",
"upn": "jackthecat@foundationaLLM.ai",
"instanceId": "73fad442-f614-4510-811f-414cb3a3d34b",
"openAIEndpoint": "https://openai-....openai.azure.com/",
"objectId": null,
"displayName": null,
"description": null,
"costCenter": null,
"properties": null,
"createdOn": "0001-01-01T00:00:00+00:00",
"updatedOn": "0001-01-01T00:00:00+00:00",
"createdBy": null,
"updatedBy": null,
"deleted": false,
"expirationDate": null,
"name": "assistant-8G...",
"_rid": "J2BUAKktW40yAAAAAAAAAA==",
"_self": "dbs/J2BUAA==/colls/J2BUAKktW40=/docs/J2BUAKktW40yAAAAAAAAAA==/",
"_etag": "\"87025e93-0000-0200-0000-672a60b70000\"",
"_attachments": "attachments/",
"_ts": 1730830519
}
Cleanup role assignments
As a result of migrated resources from storage account to Cosmos DB, as well as the new policy-assignments
mentioned above, the role-assignments
store will have obsolete Owner
role assignments on those objects. Please refer to the dedicated tool for instructions on how to perform this cleanup.
The dedicated tool will cleanup role assignments for the following resources:
FoundationaLLM.Attachment/attachments
FoundationaLLM.AzureOpenAI/fileUserContexts
FoundationaLLM.AzureOpenAI/assistantUserContexts
FoundationaLLM.Conversation/conversations
Configuration changes
Resource provider templates
The AzureOpenAI.template.json
files within deploy/quick-start/data/resource-provider/FoundationaLLM.Configuration
and deploy/standard/data/resource-provider/FoundationaLLM.Configuration
have been updated to set the category
field to the value LLM
. This discriminator allows the Management Portal to filter the list of API endpoints by category and provide options to add AI Models to endpoints with the LLM
category.
The existing category
property needs to be set to LLM
on existing API endpoint configurations in the FoundationaLLM.Configuration
resource provider that fit this description, including the AzureOpenAI
endpoint configuration.
Starting with 0.8.3
Resource provider changes
If a user/group is not assigned to the instance-level Contributor role, then they will not be able to create new Conversations or upload Attachments. To adjust their permissions, the following changes are required:
FoundationaLLM.Conversation
In addition to assigning users/groups to the policy-assignments/<instance_id>-policy.json
file within the FoundationaLLM.Authorization
resource provider to assign them to the Conversation policy, we must now add them to the new Conversation contributor role (role_definition_id
: d0d21b90-5317-499a-9208-3a6cb71b84f9
) within the role-assignments/<instance_id>-role.json
file within the FoundationaLLM.Authorization
resource provider if the user/group is not assigned to the Contributor role on the FoundationaLLM instance (role_definition_id
: a9f0020f-6e3a-49bf-8d1d-35fd53058edf
). Here is an example entry:
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "a40b15f1-75ce-4a40-a857-1093ac9adf4d",
"object_id": "/instances/0a1840df-71b6-496d-905a-145d93d827f3/providers/FoundationaLLM.Authorization/roleAssignments/a40b15f1-75ce-4a40-a857-1093ac9adf4d",
"display_name": null,
"description": "Conversation contributor role for FLLM Users",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/d0d21b90-5317-499a-9208-3a6cb71b84f9",
"principal_id": "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee",
"principal_type": "Group",
"scope": "/instances/0a1840df-71b6-496d-905a-145d93d827f3",
"properties": null,
"created_on": "0001-01-01T00:00:00+00:00",
"updated_on": "0001-01-01T00:00:00+00:00",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
}
FoundationaLLM.Attachment
In addition to assigning users/groups to the policy-assignments/<instance_id>-policy.json
file within the FoundationaLLM.Authorization
resource provider to assign them to the Attachment policy, we must now add them to the new Attachment contributor role (role_definition_id
: 8e77fb6a-7a78-43e1-b628-d9e2285fe25a
) within the role-assignments/<instance_id>-role.json
file within the FoundationaLLM.Authorization
resource provider if the user/group is not assigned to the Contributor role on the FoundationaLLM instance (role_definition_id
: a9f0020f-6e3a-49bf-8d1d-35fd53058edf
). Here is an example entry:
{
"type": "FoundationaLLM.Authorization/roleAssignments",
"name": "891ca947-e648-46cf-a12a-774b52ded886",
"object_id": "/instances/0a1840df-71b6-496d-905a-145d93d827f3/providers/FoundationaLLM.Authorization/roleAssignments/891ca947-e648-46cf-a12a-774b52ded886",
"display_name": null,
"description": "Attachment contributor role for FLLM Users",
"cost_center": null,
"role_definition_id": "/providers/FoundationaLLM.Authorization/roleDefinitions/8e77fb6a-7a78-43e1-b628-d9e2285fe25a",
"principal_id": "aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee",
"principal_type": "Group",
"scope": "/instances/0a1840df-71b6-496d-905a-145d93d827f3",
"properties": null,
"created_on": "0001-01-01T00:00:00+00:00",
"updated_on": "0001-01-01T00:00:00+00:00",
"created_by": null,
"updated_by": null,
"deleted": false,
"expiration_date": null
}
Starting with 0.8.2
Configuration changes
The following settings are required:
Name | Default value |
---|---|
FoundationaLLM:APIEndpoints:CoreAPI:Configuration:AllowedUploadFileExtensions |
c, cpp, cs, css, csv, doc, docx, gif, html, java, jpeg, jpg, js, json, md, pdf, php, png, pptx, py, rb, sh, tar, tex, ts, txt, xlsx, xml, zip |
FoundationaLLM:APIEndpoints:CoreAPI:Configuration:AzureOpenAIAssistantsFileSearchFileExtensions |
c, cpp, cs, css, doc, docx, html, java, js, json, md, pdf, php, pptx, py, rb, sh, tex, ts, txt |
FoundationaLLM:APIEndpoints:CoreAPI:Configuration:MaxUploadsPerMessage |
{ "value": 10, "value_exceptions": [] } |
FoundationaLLM:APIEndpoints:CoreAPI:Configuration:CompletionResponsePollingIntervalSeconds |
{ "value": 5, "value_exceptions": [] } |
FoundationaLLM:APIEndpoints:GatewayAPI:Configuration:AzureOpenAIAssistantsMaxVectorizationTimeSeconds |
120 |
Note
Here is an example of an override for the MaxUploadsPerMessage
setting:
{
"value": 10,
"value_exceptions": [
{
"user_principal_name": "ciprian@solliance.net",
"value": 5,
"enabled": true
}
]
}
Note
Here is an example of an override for the CompletionResponsePollingIntervalSeconds
setting:
{
"value": 5,
"value_exceptions": [
{
"user_principal_name": "ciprian@solliance.net",
"value": 3,
"enabled": true
}
]
}
The following settings are optional (they should not be set by default):
Name | Default value |
---|---|
FoundationaLLM:Instance:IdentitySubstitutionSecurityPrincipalId |
<security_principal_id> |
FoundationaLLM:Instance:IdentitySubstitutionUserPrincipalNamePattern |
^fllm_load_test_user_\d{5}_\d{3}@solliance\.net$ |
Note
The FoundationaLLM:Instance:IdentitySubstitutionSecurityPrincipalId
and FoundationaLLM:Instance:IdentitySubstitutionUserPrincipalNamePattern
settings are used for load testing purposes only. If set, their values must be replaced with the appropriate values for the specific Entra ID tenant.
Resource provider changes
The following resource provider files must be renamed (if they already exist):
Location | Old name | New name |
---|---|---|
resource-provider/FoundationaLLM.Agent |
_agent-references.json |
_resource-references.json |
resource-provider/FoundationaLLM.AIModel |
_ai-model-references.json |
_resource-references.json |
resource-provider/FoundationaLLM.Configuration |
_api-endpoint-references.json |
_resource-references.json |
resource-provider/FoundationaLLM.DataSource |
_data-source-references.json |
_resource-references.json |
resource-provider/FoundationaLLM.Prompt |
_prompt-references.json |
_resource-references.json |
Note
Within each of the renamed files, the <entity>References
property must be renamed to ResourceReferences
.
FoundationaLLM.Agent
A new property can be added to agent definitions:
"tools": {
"dalle-image-generation": {
"name": "dalle-image-generation",
"description": "Generates an image based on a prompt.",
"ai_model_object_ids": {
"main_model": "/instances/73fad442-f614-4510-811f-414cb3a3d34b/providers/FoundationaLLM.AIModel/aiModels/DALLE3"
}
}
}
FoundationaLLM.Authorization
A new storage container named policy-assignments
is required. The FoundationaLLM.Authorization
resource provider will use this container to store policy assignments.
Within the container, the <instance_id>-policy.json
must be deployed with the default policy assignments. The template for the default policy assignments is available in Common/Constants/Data/DefaultPolicyAssignments.json
.
FoundationaLLM.Conversation
When upgrading an existing FoundationaLLM instance, the items in the Sessions
collection in Cosmos DB must be updated according to the following rules:
if Object is of type Session of KioskSession:
If the property DisplayName exists and is set to a non-empty string:
Don't touch the item
else:
Set DisplayName to the value of Name
Set Name to the value of SessionId
else:
No action needed
Refer to the dedicated upgrade tool for instruction on how to perform this update.
FoundationaLLM.Configuration
The OneDrive (Work or School) integration requires the following API Endpoint Configuration entry in the storage account:
FoundationaLLM.Configuration/OneDriveFileStoreConnector.json
{
"type": "api-endpoint",
"name": "OneDriveFileStoreConnector",
"object_id": "/instances/{{instance_id}}/providers/FoundationaLLM.Configuration/apiEndpointConfigurations/OneDriveFileStoreConnector",
"display_name": null,
"description": null,
"cost_center": null,
"category": "FileStoreConnector",
"subcategory": "OneDriveWorkSchool",
"authentication_type": "AzureIdentity",
"authentication_parameters": {
"scope": "Files.Read.All"
},
"url": "{{onedrive_base_url}}",
"status_url": "",
"url_exceptions": [],
"timeout_seconds": 2400,
"retry_strategy_name": "ExponentialBackoff",
"created_on": "0001-01-01T00:00:00+00:00",
"updated_on": "0001-01-01T00:00:00+00:00",
"created_by": null,
"updated_by": "SYSTEM",
"deleted": false
}
Update FoundationaLLM.Configuration/_resource-references_.json
with the reference to the file above.
{
"Name": "OneDriveFileStoreConnector",
"Filename": "/FoundationaLLM.Configuration/OneDriveFileStoreConnector.json",
"Type": "api-endpoint",
"Deleted": false
}
FoundationaLLM.Attachment
The Attachment resource provider now saves the attachment references to Cosmos DB, instead of Data Lake storage.
A new Cosmos DB container must be created, named Attachments
, with the following partition key: /upn
.
The following MSIs require a Cosmos DB role assigned:
- Gateway API
- Orchestration API
- Management API
Long-Running Operations
The context for a long-running operation is now stored in Cosmos DB.
A new Cosmos DB container must be created, named Operations
, with a partition key /id
.
Starting with 0.8.0
Core API changes:
- All Core API endpoints have been moved to the
/instances/{instanceId}
path. For example, the/status
endpoint is now/instances/{instanceId}/status
. - The
/orchestration/*
endpoints have been moved to/instances/{instanceId}/completions/*
.- The previous
/orchestration/completions
endpoint is now/instances/{instanceId}/completions
.
- The previous
- The
/sessions/{sessionId}/completion
endpoint has been moved to/instances/{instanceId}/completions
. Instead of having thesessionId
as a path parameter, it is now in the request body as part of theCompletionRequest
payload. /sessions/{sessionId}/summarize-name
has been removed. In the future, the/completions
endpoint will be used to generate summaries.OrchestrationRequest
andCompletionRequest
have combined into a singleCompletionRequest
object.DirectionCompletionRequest
has been removed. UseCompletionRequest
instead.Status
controllers\status
action in the .NET API projects return value has renamed theInstance
property toInstanceName
.- The
CompletionController.cs
file underdotnet/CoreApi/controllers
has introduced theAsync-Completions
endpoint to handle asynchronous completions. - With the introduction of
Async-Completions
, long running operations can now report on completion status based onPending
,InProgress
,Completed
andFailed
states. - Vectorization Embedding Profile introduces a required key in the
Settings
property namedmodel_name
. Every embedding request now flows through the Gateway API. - Vectorization Indexing Profile introduces a required key
api_endpoint_configuration_object_id
in theSettings
property. - Retirement of
SemanticKernel
embedding type. All embedding requests now flow through the Gateway API.
Gatekeeper API changes:
- All Gatekeeper API endpoints have been moved to the
/instances/{instanceId}
path. For example, the/status
endpoint is now/instances/{instanceId}/status
. - The
/orchestration/*
endpoints have been moved to/instances/{instanceId}/completions/*
.
Orchestration API changes:
- All Gatekeeper API endpoints have been moved to the
/instances/{instanceId}
path. For example, the/status
endpoint is now/instances/{instanceId}/status
. - The
/orchestration/*
endpoints have been moved to/instances/{instanceId}/completions/*
. =======
New APIs
Gateway Adapter API - requires the following configuration settings:
FoundationaLLM:APIs:GatewayAdapterAPI:APIUrl
FoundationaLLM:APIs:GatewayAdapterAPI:APIKey
(mapped to thefoundationallm-apis-gatewayadapterapi-apikey
secret)FoundationaLLM:APIs:GatewayAdapterAPI:APIAppInsightsConnectionString
(mapped to thefoundationallm-app-insights-connection-string
secret)
State API - requires the following configuration settings:
FoundationaLLM:APIs:StateAPI:APIUrl
FoundationaLLM:APIs:StateAPI:APIKey
(mapped to thefoundationallm-apis-stateapi-apikey
secret)FoundationaLLM:APIs:StateAPI:APIAppInsightsConnectionString
(mapped to thefoundationallm-app-insights-connection-string
secret)
Note
These new APIs will be converted to use the new APIEndpoint
artifacts.
Changes in app registration names
API Name | Entra ID app registration name | Application ID URI | Scope name |
---|---|---|---|
Core API | FoundationaLLM-Core-API |
api://FoundationaLLM-Core |
Data.Read |
Management API | FoundationaLLM-Management-API |
api://FoundationaLLM-Management |
Data.Manage |
Authorization API | FoundationaLLM-Authorization-API |
api://FoundationaLLM-Authorization |
Authorization.Manage |
User Portal | FoundationaLLM-Core-Portal |
api://FoundationaLLM-Core-Portal |
N/A |
Management Portal | FoundationaLLM-Management-Portal |
api://FoundationaLLM-Management-Portal |
N/A |
Changes in app configuration settings
The FoundationaLLM:APIs
and FoundationaLLM:ExternalAPIs
configuration namespaces have been replaced with the FoundationaLLM:APIEndpoints
configuration namespace.
Important
All existing API registrations need to be updated to reflect these changes. The only two settings that will exist under FoundationaLLM:APIEndpoints
are APIKey
(for those API enpoints which use API key authentication) and AppInsightsConnectionString
, all the other settings are now part of the APIEndpoint
artifact managed by the FoundationaLLM.Configuration
resource provider.
This is an example for CoreAPI
:
FoundationaLLM:APIEndpoints:CoreAPI:APIKey
FoundationaLLM:APIEndpoints:CoreAPI:AppInsightsConnectionString
The FoundationaLLM:AzureAIStudio
configuration namespace expects an APIEndpointConfigurationName
property instead of BaseUrl
.
A new configuration setting named FoundationaLLM:Instance:SecurityGroupRetrievalStrategy
with a value of IdentityManagementService
must exist in the app configuration. It will be added by default in new deployments.
Two new configuration settings required by the new FoundationaLLM.AzureOpenAI
resource provider:
FoundationaLLM:ResourceProviders:AzureOpenAI:Storage:AuthenticationType
FoundationaLLM:ResourceProviders:AzureOpenAI:Storage:AccountName
Pre-0.8.0
Vectorization resource stores use a unique collection name,
Resources
. They also add a new top-level property namedDefaultResourceName
.The items in the
index_references
collection have a property incorrectly namedtype
which was renamed toindex_entry_id
.New gateway API, requires the following app configurations:
FoundationaLLM:APIs:GatewayAPI:APIUrl
FoundationaLLM:APIs:GatewayAPI:APIKey
(with secretfoundationallm-apis-gatewayapi-apikey
)FoundationaLLM:APIs:GatewayAPI:AppInsightsConnectionString
(with secretfoundationallm-app-insights-connection-string
)FoundationaLLM:Gateway:AzureOpenAIAccounts
The
AgentFactory
andAgentFactoryAPI
classes have been renamed toOrchestration
andOrchestrationAPI
, respectively. The following App Config settings need to be replaced in existing environments:FoundationaLLM:APIs:AgentFactoryAPI:APIKey
->FoundationaLLM:APIs:OrchestrationAPI:APIKey
FoundationaLLM:APIs:AgentFactoryAPI:APIUrl
->FoundationaLLM:APIs:OrchestrationAPI:APIUrl
FoundationaLLM:APIs:AgentFactoryAPI:AppInsightsConnectionString
->FoundationaLLM:APIs:OrchestrationAPI:AppInsightsConnectionString
FoundationaLLM:Events:AzureEventGridEventService:Profiles:AgentFactoryAPI
->FoundationaLLM:Events:AzureEventGridEventService:Profiles:OrchestrationAPI
FoundationaLLM:APIs:AgentFactoryAPI:ForceHttpsRedirection
-?FoundationaLLM:APIs:OrchestrationAPI:ForceHttpsRedirection
The following Key Vault secrets need to be replaced in existing environments:
foundationallm-apis-agentfactoryapi-apikey
->foundationallm-apis-orchestrationapi-apikey
There is an upgrade script available that migrates these settings and secrets to their new names.
The following App Config settings are no longer needed:
FoundationaLLM:Vectorization:Queues:Embed:ConnectionString
FoundationaLLM:Vectorization:Queues:Extract:ConnectionString
FoundationaLLM:Vectorization:Queues:Index:ConnectionString
FoundationaLLM:Vectorization:Queues:Partition:ConnectionString
The following Key Vault secret is no longer needed:
foundationallm-vectorization-queues-connectionstring
The following App Config settings need to be added as key-values:
FoundationaLLM:Vectorization:Queues:Embed:AccountName
(set to the name of the storage account that contains the vectorization queues - e.g.,stejahszxcubrpi
)FoundationaLLM:Vectorization:Queues:Extract:AccountName
(set to the name of the storage account that contains the vectorization queues - e.g.,stejahszxcubrpi
)FoundationaLLM:Vectorization:Queues:Index:AccountName
(set to the name of the storage account that contains the vectorization queues - e.g.,stejahszxcubrpi
)FoundationaLLM:Vectorization:Queues:Partition:AccountName
(set to the name of the storage account that contains the vectorization queues - e.g.,stejahszxcubrpi
)
The value for the App Config setting
FoundationaLLM:Events:AzureEventGridEventService:Profiles:OrchestrationAPI
should be set in the following format:{ "EventProcessingCycleSeconds": 20, "Topics": [ { "Name": "storage", "SubscriptionPrefix": "orch", "EventTypeProfiles": [ { "EventType": "Microsoft.Storage.BlobCreated", "EventSets": [ { "Namespace": "ResourceProvider.FoundationaLLM.Agent", "Source": "/subscriptions/0a03d4f9-c6e4-4ee1-87fb-e2005d2c213d/resourceGroups/rg-fllm-aca-050/providers/Microsoft.Storage/storageAccounts/stejahszxcubrpi", "SubjectPrefix": "/blobServices/default/containers/resource-provider/blobs/FoundationaLLM.Agent" }, { "Namespace": "ResourceProvider.FoundationaLLM.Vectorization", "Source": "/subscriptions/0a03d4f9-c6e4-4ee1-87fb-e2005d2c213d/resourceGroups/rg-fllm-aca-050/providers/Microsoft.Storage/storageAccounts/stejahszxcubrpi", "SubjectPrefix": "/blobServices/default/containers/resource-provider/blobs/FoundationaLLM.Vectorization" }, { "Namespace": "ResourceProvider.FoundationaLLM.Prompt", "Source": "/subscriptions/0a03d4f9-c6e4-4ee1-87fb-e2005d2c213d/resourceGroups/rg-fllm-aca-050/providers/Microsoft.Storage/storageAccounts/stejahszxcubrpi", "SubjectPrefix": "/blobServices/default/containers/resource-provider/blobs/FoundationaLLM.Prompt" } ] } ] } ] }
Vectorization text embedding profiles require only two items in the
configuration_references
section:DeploymentName
andEndpoint
. Optionally, adeployment_name
entry can be specified in thesettings
section to override the default value inconfiguration_references.Endpoint
. Here is an example of the updated format for a text embedding profile:{ "type": "text-embedding-profile", "name": "AzureOpenAI_Embedding_BaselineGlobalMacro", "object_id": "/instances/a6221c30-0bf2-4003-adb8-d3086bb2ad49/providers/FoundationaLLM.Vectorization/textEmbeddingProfiles/AzureOpenAI_Embedding_BaselineGlobalMacro", "display_name": null, "description": null, "text_embedding": "SemanticKernelTextEmbedding", "settings": { "deployment_name": "embeddings-3-large" }, "configuration_references": { "DeploymentName": "FoundationaLLM:Vectorization:SemanticKernelTextEmbeddingService:DeploymentName", "Endpoint": "FoundationaLLM:Vectorization:SemanticKernelTextEmbeddingService:Endpoint" }, "created_on": "0001-01-01T00:00:00+00:00", "updated_on": "0001-01-01T00:00:00+00:00", "created_by": null, "updated_by": null, "deleted": false }
External orchestration APIs must be configured using the
FoundationaLLM:ExternalAPIs
configuration namespace. For example, theBaselineTradingGlobalMacro
external API has the following configurations:FoundationaLLM:ExternalAPIs:BaselineTradingGlobalMacro:APIUrl
FoundationaLLM:ExternalAPIs:BaselineTradingGlobalMacro:APIKey
Note
These entries do not need to be created as part of the deployment process.
App Config key namespace that was previously
FoundationaLLM:Vectorization:ContentSources:*
has been moved toFoundationaLLM:DataSources:*
. All existing keys need to be moved to the new namespace.New app config entries required:
FoundationaLLM:Attachment:ResourceProviderService:Storage:AuthenticationType
FoundationaLLM:Attachment:ResourceProviderService:Storage:AccountName
App Config key namespace that was previously
FoundationaLLM:Vectorization:ContentSources:*
has been moved toFoundationaLLM:DataSources:*
. All existing keys need to be moved to the new namespace.The following App Config setting needs to be added/updated as key-values:
- Add
FoundationaLLM:APIs:GatekeeperAPI:Configuration:EnableAzureContentSafetyPromptShield
- Add
FoundationaLLM:APIs:GatekeeperAPI:Configuration:EnableLakeraGuard
- Add
FoundationaLLM:APIs:GatekeeperAPI:Configuration:EnableEnkryptGuardrails
- Rename
FoundationaLLM:AzureContentSafety:APIKey
inFoundationaLLM:APIs:Gatekeeper:AzureContentSafety:APIKey
- Rename
FoundationaLLM:AzureContentSafety:APIUrl
inFoundationaLLM:APIs:Gatekeeper:AzureContentSafety:APIUrl
- Rename
FoundationaLLM:AzureContentSafety:HateSeverity
inFoundationaLLM:APIs:Gatekeeper:AzureContentSafety:HateSeverity
- Rename
FoundationaLLM:AzureContentSafety:SelfHarmSeverity
inFoundationaLLM:APIs:Gatekeeper:AzureContentSafety:SelfHarmSeverity
- Rename
FoundationaLLM:AzureContentSafety:SexualSeverity
inFoundationaLLM:APIs:Gatekeeper:AzureContentSafety:SexualSeverity
- Rename
FoundationaLLM:AzureContentSafety:ViolenceSeverity
inFoundationaLLM:APIs:Gatekeeper:AzureContentSafety:ViolenceSeverity
- Add
FoundationaLLM:APIs:Gatekeeper:LakeraGuard:APIKey
- Add
FoundationaLLM:APIs:Gatekeeper:LakeraGuard:APIUrl
- Add
FoundationaLLM:APIs:Gatekeeper:EnkryptGuardrails:APIKey
- Add
FoundationaLLM:APIs:Gatekeeper:EnkryptGuardrails:APIUrl
The following Key Vault secret is needed:
lakera-guard-api-key
enkrypt-guardrails-apikey