Skip to content

Commit 2a6a72d

Browse files
committed
fixing redirects and more fixes
1 parent f7691a5 commit 2a6a72d

File tree

6 files changed

+9
-9
lines changed

6 files changed

+9
-9
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5970,5 +5970,10 @@
59705970
"redirect_url": "/azure/nat-gateway/nat-overview",
59715971
"redirect_document_id": false
59725972
},
5973+
{
5974+
"source_path": "articles/sentinel/kusto-resources.md",
5975+
"redirect_url": "/kusto/query/kql-learning-resources?view=microsoft-sentinel?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json",
5976+
"redirect_document_id": false
5977+
}
59735978
]
59745979
}

articles/sentinel/audit-track-tasks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Apart from the **Incident tasks workbook**, you can audit task activity by query
5050
5151
You can add any number of statements to the query to filter and narrow down the results. To demonstrate how to view and understand the results, we're going to add statements to filter the results so that we only see the tasks for a single incident, and we'll also add a `project` statement so that we see only those fields that will be useful for our purposes, without a lot of clutter.
5252
53-
[Learn more about using Kusto Query Language](/kusto/query/kusto-sentinel-overview).
53+
For more information, see [Kusto Query Language overview](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json).
5454
5555
```kusto
5656
SecurityIncident

articles/sentinel/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ landingContent:
135135
url: incident-investigation.md
136136
- text: Threat hunting
137137
url: hunting.md
138-
- text: Kusto Query Language in Microsoft Sentinel
138+
- text: Kusto Query Language overview
139139
url: /kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json
140140
- text: Automation rules
141141
url: automate-incident-handling-with-automation-rules.md

articles/sentinel/migration-convert-dashboards.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Before finalizing your KQL queries, always review and tune the queries to improv
6060

6161
For more information, see the following resources:
6262

63-
- [KQL query best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true)
63+
- [KQL query best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json)
6464
- [Optimize queries in Azure Monitor Logs](/azure/azure-monitor/logs/query-optimization)
6565
- [Optimizing KQL performance (webinar)](https://youtu.be/jN1Cz0JcLYU)
6666

articles/sentinel/monitor-analytics-rule-integrity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ For either **Scheduled analytics rule run** or **NRT analytics rule run**, you m
171171
| A function called by the query is named with a reserved word. | Remove or rename the function. |
172172
| A syntax error occurred while running the query. | Try resetting the analytics rule by editing and saving it (without changing any settings). |
173173
| The workspace does not exist. | |
174-
| This query was found to use too many system resources and was prevented from running. | Review and tune the analytics rule. Consult our Kusto Query Language [overview](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) and [best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) documentation. |
174+
| This query was found to use too many system resources and was prevented from running. | Review and tune the analytics rule. Consult our Kusto Query Language [overview](/kusto/query/?view=microsoft-sentinel&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) and [best practices](/kusto/query/best-practices?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json) documentation. |
175175
| A function called by the query was not found. | Verify the existence in your workspace of all functions called by the query. |
176176
| The workspace used in the query was not found. | Verify that all workspaces in the query exist. |
177177
| You don't have permissions to run this query. | Try resetting the analytics rule by editing and saving it (without changing any settings). |

redirects/.openpublishing.redirection.sentinel.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2219,11 +2219,6 @@
22192219
"source_path_from_root": "/articles/sentinel/data-connectors/awake-security.md",
22202220
"redirect_url": "/previous-versions/azure/sentinel/data-connectors/awake-security-via-legacy-agent",
22212221
"redirect_document_id": false
2222-
},
2223-
{
2224-
"source_path": "articles/sentinel/kusto-resources.md",
2225-
"redirect_url": "/kusto/query/kql-learning-resources?view=microsoft-sentinel?view=microsoft-sentinel&preserve-view=true&toc=/azure/sentinel/TOC.json&bc=/azure/sentinel/breadcrumb/toc.json",
2226-
"redirect_document_id": false
22272222
}
22282223
]
22292224
}

0 commit comments

Comments
 (0)