Skip to content

Commit 14a1955

Browse files
committed
edit pass: log-articles-batch-6
1 parent 4b487bc commit 14a1955

File tree

2 files changed

+6
-8
lines changed

2 files changed

+6
-8
lines changed

articles/azure-monitor/logs/logs-data-export.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -585,7 +585,7 @@ DELETE https://management.azure.com/subscriptions/<subscription-id>/resourcegrou
585585

586586
# [Template](#tab/json)
587587

588-
The template option isn't applicable.
588+
The template option doesn't apply.
589589

590590
---
591591

@@ -623,7 +623,7 @@ GET https://management.azure.com/subscriptions/<subscription-id>/resourcegroups/
623623

624624
# [Template](#tab/json)
625625

626-
The template option isn't applicable.
626+
The template option doesn't apply.
627627

628628
---
629629

articles/azure-monitor/logs/move-workspace.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ In this article, you'll learn the steps to move a Log Analytics workspace to ano
1717
> [!IMPORTANT]
1818
> You can't move a workspace to a different region by using this procedure. Follow the steps in the article [Move a Log Analytics workspace to another region](./move-workspace-region.md) to move a workspace across regions.
1919
20-
## Verify the Active Directory tenant
20+
## Verify the Azure Active Directory tenant
2121
The workspace source and destination subscriptions must exist within the same Azure Active Directory tenant. Use Azure PowerShell to verify that both subscriptions have the same tenant ID.
2222

2323
```powershell
@@ -36,19 +36,17 @@ Consider these points before you move a Log Analytics workspace:
3636
- Start/Stop VMs during off-hours
3737
- Microsoft Defender for Cloud
3838
- Workspace keys (both primary and secondary) are regenerated with a workspace move operation. If you keep a copy of your workspace keys in Azure Key Vault, update them with the new keys generated after the workspace is moved.
39-
- Connected [Log Analytics agents](../agents/log-analytics-agent.md) remain connected and keep sending data to the workspace after the move. [Azure Monitor Agent](../agents/azure-monitor-agent-overview.md) via data collection rules will be disconnected during the move and should be reconfigured after the move.
39+
- Connected [Log Analytics agents](../agents/log-analytics-agent.md) remain connected and keep sending data to the workspace after the move. [Azure Monitor Agent](../agents/azure-monitor-agent-overview.md) will be disconnected via data collection rules during the move and should be reconfigured after the move.
4040

4141
>[!IMPORTANT]
4242
> **Microsoft Sentinel customers**
4343
> - Currently, after Microsoft Sentinel is deployed on a workspace, moving the workspace to another resource group or subscription isn't supported.
4444
> - If you've already moved the workspace, disable all active rules under **Analytics** and reenable them after five minutes. This solution should be effective in most cases, although it's unsupported and undertaken at your own risk.
4545
> - It could take Azure Resource Manager a few hours to complete. Solutions might be unresponsive during the operation.
4646
>
47-
> **Re-create alerts**
48-
> - All alerts must be re-created because the permissions are based on the workspace resource ID, which changes during a workspace move or resource name change. Alerts in workspaces created after June 1, 2019, or in workspaces that were [upgraded from the legacy Log Analytics Alert API to the scheduledQueryRules API](../alerts/alerts-log-api-switch.md) can be exported in templates and deployed after the move. You can [check if the scheduledQueryRules API is used for alerts in your workspace](../alerts/alerts-log-api-switch.md#check-switching-status-of-workspace). Alternatively, you can configure alerts manually in the target workspace.
47+
> **Re-create alerts:** All alerts must be re-created because the permissions are based on the workspace resource ID, which changes during a workspace move or resource name change. Alerts in workspaces created after June 1, 2019, or in workspaces that were [upgraded from the legacy Log Analytics Alert API to the scheduledQueryRules API](../alerts/alerts-log-api-switch.md) can be exported in templates and deployed after the move. You can [check if the scheduledQueryRules API is used for alerts in your workspace](../alerts/alerts-log-api-switch.md#check-switching-status-of-workspace). Alternatively, you can configure alerts manually in the target workspace.
4948
>
50-
> **Update resource paths**
51-
> - After a workspace move, any Azure or external resources that point to the workspace must be reviewed and updated to point to the new resource target path.
49+
> **Update resource paths:** After a workspace move, any Azure or external resources that point to the workspace must be reviewed and updated to point to the new resource target path.
5250
>
5351
> Examples:
5452
> - [Azure Monitor alert rules](../alerts/alerts-resource-move.md)

0 commit comments

Comments
 (0)