Skip to content

Commit 149e1aa

Browse files
authored
Merge pull request #253145 from IlanaWaitser/docs-editor/ingest-logs-event-hub-1695899171
Update ingest-logs-event-hub.md
2 parents 8168926 + f006042 commit 149e1aa

File tree

2 files changed

+7
-9
lines changed

2 files changed

+7
-9
lines changed

articles/azure-monitor/logs/ingest-logs-event-hub.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,7 @@ ms.custom: references_regions
1212
# customer-intent: As a DevOps engineer, I want to ingest data from an event hub into a Log Analytics workspace so that I can monitor logs that I send to Azure Event Hubs.
1313
---
1414

15-
16-
# Tutorial: Ingest events from Azure Event Hubs into Azure Monitor Logs (Preview)
15+
# Tutorial: Ingest events from Azure Event Hubs into Azure Monitor Logs (Public Preview)
1716

1817
[Azure Event Hubs](../../event-hubs/event-hubs-about.md) is a big data streaming platform that collects events from multiple sources to be ingested by Azure and external services. This article explains how to ingest data directly from an event hub into a Log Analytics workspace.
1918

@@ -325,6 +324,7 @@ To ingest data into a [supported Azure table](../logs/logs-ingestion-api-overvie
325324
To: `"outputStream": "outputStream": "[concat(Microsoft-', parameters('tableName'))]"`
326325

327326
1. In `transformKql`, [define a transformation](../essentials/data-collection-transformations-structure.md#transformation-structure) that sends the ingested data into the target columns in the destination Azure table.
327+
328328
## Grant the event hub permission to the data collection rule
329329

330330
With [managed identity](../../active-directory/managed-identities-azure-resources/overview.md), you can give any event hub, or Event Hubs namespace, permission to send events to the data collection rule and data collection endpoint you created. When you grant the permissions to the Event Hubs namespace, all event hubs within the namespace inherit the permissions.
@@ -337,16 +337,14 @@ With [managed identity](../../active-directory/managed-identities-azure-resource
337337

338338
:::image type="content" source="media/ingest-logs-event-hub/event-hub-data-receiver-role-assignment.png" lightbox="media/ingest-logs-event-hub/event-hub-data-receiver-role-assignment.png" alt-text="Screenshot that shows the Add Role Assignment screen for the event hub with the Azure Event Hubs Data Receiver role highlighted.":::
339339

340-
3. Select **User, group, or service principal** for **Assign access to** and click **Select members**. Select your DCR and click **Select**.
341-
342-
:::image type="content" source="media/ingest-logs-event-hub/event-hub-add-role-assignment-select-member.png" lightbox="media/ingest-logs-event-hub/event-hub-add-role-assignment-select-member.png" alt-text="Screenshot that shows the Members tab of the Add Role Assignment screen.":::
340+
1. Select **Managed identity** for **Assign access to** and click **Select members**. Select **Data collection rule**, search your DCR by name and click **Select**.
343341

342+
[ ![Screenshot of how to assign access to managed identity.](media/ingest-logs-event-hub/assign-access-to-managed-identity.png) ](media/ingest-logs-event-hub/assign-access-to-managed-identity.png#lightbox)
344343

345344
4. Select **Review + assign** and verify the details before saving your role assignment.
346345

347346
:::image type="content" source="media/ingest-logs-event-hub/event-hub-add-role-assignment-save.png" lightbox="media/ingest-logs-event-hub/event-hub-add-role-assignment-save.png" alt-text="Screenshot that shows the Review and Assign tab of the Add Role Assignment screen.":::
348347

349-
350348
## Associate the data collection rule with the event hub
351349

352350
The final step is to associate the data collection rule to the event hub from which you want to collect events.
@@ -414,7 +412,6 @@ To create a data collection rule association in the Azure portal:
414412

415413
1. Select **Review + create** and then **Create** when you review the details.
416414

417-
418415
## Check your destination table for ingested events
419416

420417
Now that you've associated the data collection rule with your event hub, Azure Monitor Logs will ingest all existing events whose [retention period](/azure/event-hubs/event-hubs-features#event-retention) hasn't expired and all new events.
@@ -429,9 +426,8 @@ To check your destination table for ingested events:
429426
```
430427

431428
You should see events from your event hub.
432-
`
433-
:::image type="content" source="media/ingest-logs-event-hub/log-analytics-query-results-with-events.png" lightbox="media/ingest-logs-event-hub/log-analytics-query-results-with-events.png" alt-text="Screenshot showing the results of a simple query on a custom table. The results consist of events ingested from an event hub.":::
434429

430+
:::image type="content" source="media/ingest-logs-event-hub/log-analytics-query-results-with-events.png" lightbox="media/ingest-logs-event-hub/log-analytics-query-results-with-events.png" alt-text="Screenshot showing the results of a simple query on a custom table. The results consist of events ingested from an event hub.":::
435431
## Clean up resources
436432

437433
In this tutorial, you created the following resources:
@@ -457,3 +453,5 @@ Learn more about to:
457453
- [Create a custom table](../logs/create-custom-table.md#create-a-custom-table).
458454
- [Create a data collection endpoint](../essentials/data-collection-endpoint-overview.md#create-a-data-collection-endpoint).
459455
- [Update an existing data collection rule](../essentials/data-collection-rule-edit.md).
456+
457+
244 KB
Loading

0 commit comments

Comments
 (0)