Skip to content

Commit 1314067

Browse files
authored
Merge pull request #295150 from batamig/kusto-fixes-ii
[SCOPED] fixing kusto links ii
2 parents d7532f6 + 2a6a72d commit 1314067

14 files changed

+33
-87
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5970,5 +5970,10 @@
59705970
"redirect_url": "/azure/nat-gateway/nat-overview",
59715971
"redirect_document_id": false
59725972
},
5973+
{
5974+
"source_path": "articles/sentinel/kusto-resources.md",
5975+
"redirect_url": "/kusto/query/kql-learning-resources?view=microsoft-sentinel?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json",
5976+
"redirect_document_id": false
5977+
}
59735978
]
59745979
}

articles/sentinel/TOC.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -908,7 +908,7 @@
908908
- name: Kusto Query Language
909909
items:
910910
- name: Overview
911-
href: /kusto/query/kusto-sentinel-overview?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
911+
href: /kusto/query/?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
912912
- name: Query best practices
913913
href: /kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
914914
- name: SQL to KQL cheat sheet
@@ -917,8 +917,10 @@
917917
href: /kusto/query/splunk-cheat-sheet?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
918918
- name: KQL quick reference
919919
href: /kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
920+
- name: Common tasks with KQL for Microsoft Sentinel
921+
href: /kusto/query/tutorials/common-tasks-microsoft-sentinel?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
920922
- name: Other KQL resources
921-
href: kusto-resources.md
923+
href: /kusto/query/kql-learning-resources?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
922924
- name: Create custom query
923925
href: hunts-custom-queries.md
924926
- name: Bookmarks

articles/sentinel/audit-track-tasks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Apart from the **Incident tasks workbook**, you can audit task activity by query
5050
5151
You can add any number of statements to the query to filter and narrow down the results. To demonstrate how to view and understand the results, we're going to add statements to filter the results so that we only see the tasks for a single incident, and we'll also add a `project` statement so that we see only those fields that will be useful for our purposes, without a lot of clutter.
5252
53-
[Learn more about using Kusto Query Language](/kusto/query/kusto-sentinel-overview).
53+
For more information, see [Kusto Query Language overview](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json).
5454
5555
```kusto
5656
SecurityIncident

articles/sentinel/create-analytics-rule-from-template.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection: usx-security
1616
---
1717
# Create scheduled analytics rules from templates
1818

19-
By far the most common type of analytics rule, **Scheduled** rules are based on [Kusto queries](/kusto/query/kusto-sentinel-overview) that are configured to run at regular intervals and examine raw data from a defined "lookback" period. These queries can perform complex statistical operations on their target data, revealing baselines and outliers in groups of events. If the number of results captured by the query passes the threshold configured in the rule, the rule produces an alert.
19+
By far the most common type of analytics rule, **Scheduled** rules are based on [Kusto queries](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) that are configured to run at regular intervals and examine raw data from a defined "lookback" period. These queries can perform complex statistical operations on their target data, revealing baselines and outliers in groups of events. If the number of results captured by the query passes the threshold configured in the rule, the rule produces an alert.
2020

2121
Microsoft makes a vast array of **analytics rule templates** available to you through the many [solutions provided in the Content hub](sentinel-solutions.md), and strongly encourages you to use them to create your rules. The queries in scheduled rule templates are written by security and data science experts, either from Microsoft or from the vendor of the solution providing the template.
2222

@@ -82,12 +82,11 @@ From the Microsoft Defender navigation menu, expand **Microsoft Sentinel**, then
8282

8383
1. The rule creation wizard opens. All the details are autofilled.
8484

85-
1. Cycle through the tabs of the wizard, customizing the logic and other rule settings where possible to better suit your specific needs.
85+
1. Cycle through the tabs of the wizard, customizing the logic and other rule settings where possible to better suit your specific needs. For more information, see:
8686

87-
If you need to make any changes to the query itself, consult the following articles from the Kusto documentation for help:
88-
- [Kusto Query Language in Microsoft Sentinel](/kusto/query/kusto-sentinel-overview)
87+
- [Kusto Query Language in Microsoft Sentinel](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)
8988
- [KQL quick reference guide](/kusto/query/kql-quick-reference?view=microsoft-sentinel&preserve-view=true)
90-
- [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true)
89+
- [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)
9190

9291
When you get to the end of the rule creation wizard, Microsoft Sentinel creates the rule. The new rule appears in the **Active rules** tab.
9392

articles/sentinel/create-analytics-rules.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,11 @@ Before you do anything else, you should design and build a query in Kusto Query
4444

4545
1. Build and test your queries in the **Logs** screen. When you’re satisfied, save the query for use in your rule.
4646

47-
For some helpful tips for building Kusto queries, see [Best practices for analytics rule queries](scheduled-rules-overview.md#best-practices-for-analytics-rule-queries).
47+
For more information, see:
4848

49-
For more help building Kusto queries, see [Kusto Query Language in Microsoft Sentinel](/kusto/query/kusto-sentinel-overview) and [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true) (from the Kusto documentation).
49+
- [Best practices for analytics rule queries](scheduled-rules-overview.md#best-practices-for-analytics-rule-queries).
50+
- [Kusto Query Language in Microsoft Sentinel](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)
51+
- [Best practices for Kusto Query Language queries](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)
5052

5153
## Create your analytics rule
5254

articles/sentinel/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,8 +135,8 @@ landingContent:
135135
url: incident-investigation.md
136136
- text: Threat hunting
137137
url: hunting.md
138-
- text: Kusto Query Language in Microsoft Sentinel
139-
url: /kusto/query/kusto-sentinel-overview?toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
138+
- text: Kusto Query Language overview
139+
url: /kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
140140
- text: Automation rules
141141
url: automate-incident-handling-with-automation-rules.md
142142
- text: Playbooks

articles/sentinel/kusto-resources.md

Lines changed: 0 additions & 62 deletions
This file was deleted.

articles/sentinel/migration-convert-dashboards.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Before finalizing your KQL queries, always review and tune the queries to improv
6060

6161
For more information, see the following resources:
6262

63-
- [KQL query best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true)
63+
- [KQL query best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)
6464
- [Optimize queries in Azure Monitor Logs](/azure/azure-monitor/logs/query-optimization)
6565
- [Optimizing KQL performance (webinar)](https://youtu.be/jN1Cz0JcLYU)
6666

articles/sentinel/monitor-analytics-rule-integrity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ For either **Scheduled analytics rule run** or **NRT analytics rule run**, you m
171171
| A function called by the query is named with a reserved word. | Remove or rename the function. |
172172
| A syntax error occurred while running the query. | Try resetting the analytics rule by editing and saving it (without changing any settings). |
173173
| The workspace does not exist. | |
174-
| This query was found to use too many system resources and was prevented from running. | Review and tune the analytics rule. Consult our Kusto Query Language [overview](/kusto/query/kusto-sentinel-overview) and [best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=%2Fazure%2Fsentinel%2FTOC.json&bc=%2Fazure%2Fsentinel%2Fbreadcrumb%2Ftoc.json) documentation. |
174+
| This query was found to use too many system resources and was prevented from running. | Review and tune the analytics rule. Consult our Kusto Query Language [overview](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) and [best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) documentation. |
175175
| A function called by the query was not found. | Verify the existence in your workspace of all functions called by the query. |
176176
| The workspace used in the query was not found. | Verify that all workspaces in the query exist. |
177177
| You don't have permissions to run this query. | Try resetting the analytics rule by editing and saving it (without changing any settings). |

articles/sentinel/normalization-ingest-time.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Learn more about writing parsers in [Developing ASIM parsers](normalization-deve
6161

6262
To normalize data at ingest, you need to use a [Data Collection Rule (DCR)](/azure/azure-monitor/essentials/data-collection-rule-overview). The procedure for implementing the DCR depends on the method used to ingest the data. For more information, see the article [Transform or customize data at ingestion time in Microsoft Sentinel](configure-data-transformation.md).
6363

64-
A [KQL](/kusto/query/kusto-sentinel-overview) transformation query is the core of a DCR. The KQL version used in DCRs is slightly different than the version used elsewhere in Microsoft Sentinel to accommodate for requirements of pipeline event processing. Therefore, you need to modify any query-time parser to use it in a DCR. For more information on the differences, and how to convert a query-time parser to an ingest-time parser, read about the [DCR KQL limitations](/azure/azure-monitor/essentials/data-collection-transformations-structure#kql-limitations).
64+
A [KQL](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) transformation query is the core of a DCR. The KQL version used in DCRs is slightly different than the version used elsewhere in Microsoft Sentinel to accommodate for requirements of pipeline event processing. Therefore, you need to modify any query-time parser to use it in a DCR. For more information on the differences, and how to convert a query-time parser to an ingest-time parser, read about the [DCR KQL limitations](/azure/azure-monitor/essentials/data-collection-transformations-structure#kql-limitations).
6565

6666

6767
## <a name="next-steps"></a>Next steps

0 commit comments

Comments
 (0)