Skip to content

Commit 2fb6063

Browse files
authored
Merge pull request #220949 from bwren/vm-scenario
VM scenario updates for AMA
2 parents b187c83 + 17f8fc7 commit 2fb6063

26 files changed

+835
-725
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5626,6 +5626,21 @@
56265626
"source_path_from_root": "/articles/azure-monitor/vm/vminsights-health-troubleshoot.md",
56275627
"redirect_url": "/azure/azure-monitor/vm/vminsights-overview",
56285628
"redirect_document_id": false
5629+
},
5630+
{
5631+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-configure.md",
5632+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5633+
"redirect_document_id": false
5634+
},
5635+
{
5636+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-security.md",
5637+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine#security-monitoring",
5638+
"redirect_document_id": false
5639+
},
5640+
{
5641+
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-workloads.md",
5642+
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
5643+
"redirect_document_id": false
56295644
}
56305645
]
56315646
}

articles/azure-monitor/agents/agent-linux-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ A clean reinstall of the agent fixes most issues. This task might be the first s
8989
| NOT_DEFINED | Because the necessary dependencies aren't installed, the auoms auditd plug-in won't be installed. Installation of auoms failed. Install package auditd. |
9090
| 2 | Invalid option provided to the shell bundle. Run `sudo sh ./omsagent-*.universal*.sh --help` for usage. |
9191
| 3 | No option provided to the shell bundle. Run `sudo sh ./omsagent-*.universal*.sh --help` for usage. |
92-
| 4 | Invalid package type *or* invalid proxy settings. The omsagent-*rpm*.sh packages can only be installed on RPM-based systems. The omsagent-*deb*.sh packages can only be installed on Debian-based systems. We recommend that you use the universal installer from the [latest release](../vm/monitor-virtual-machine.md#agents). Also review to verify your proxy settings. |
92+
| 4 | Invalid package type *or* invalid proxy settings. The omsagent-*rpm*.sh packages can only be installed on RPM-based systems. The omsagent-*deb*.sh packages can only be installed on Debian-based systems. We recommend that you use the universal installer from the [latest release](agent-linux.md#agent-install-package). Also review to verify your proxy settings. |
9393
| 5 | The shell bundle must be executed as root *or* there was a 403 error returned during onboarding. Run your command by using `sudo`. |
9494
| 6 | Invalid package architecture *or* there was a 200 error returned during onboarding. The omsagent-\*x64.sh packages can only be installed on 64-bit systems. The omsagent-\*x86.sh packages can only be installed on 32-bit systems. Download the correct package for your architecture from the [latest release](https://github.com/Microsoft/OMS-Agent-for-Linux/releases/latest). |
9595
| 17 | Installation of OMS package failed. Look through the command output for the root failure. |
@@ -200,7 +200,7 @@ Below the output plug-in, uncomment the following section by removing the `#` in
200200

201201
1. Review the section [Update proxy settings](agent-manage.md#update-proxy-settings) to verify you've properly configured the agent to communicate through a proxy server.
202202

203-
1. Double-check that the endpoints outlined in the Azure Monitor [network firewall requirements](./log-analytics-agent.md#firewall-requirements) list are added to an allow list correctly. If you use Azure Automation, the necessary network configuration steps are also linked above.
203+
1. Double-check that the endpoints outlined in the Azure Monitor [network firewall requirements](./log-analytics-agent.md#firewall-requirements) list are added to an allowlist correctly. If you use Azure Automation, the necessary network configuration steps are also linked above.
204204

205205
## Issue: You receive a 403 error when trying to onboard
206206

articles/azure-monitor/agents/data-collection-iis.md

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,36 @@ To create the data collection rule in the Azure portal:
7979
> [!NOTE]
8080
> It can take up to 5 minutes for data to be sent to the destinations after you create the data collection rule.
8181
82+
83+
### Sample log queries
84+
85+
- **Count the IIS log entries by URL for the host www.contoso.com.**
86+
87+
```kusto
88+
W3CIISLog
89+
| where csHost=="www.contoso.com"
90+
| summarize count() by csUriStem
91+
```
92+
93+
- **Review the total bytes received by each IIS machine.**
94+
95+
```kusto
96+
W3CIISLog
97+
| summarize sum(csBytes) by Computer
98+
```
99+
100+
101+
## Sample alert rule
102+
103+
- **Create an alert rule on any record with a return status of 500.**
104+
105+
```kusto
106+
W3CIISLog
107+
| where scStatus==500
108+
| summarize AggregatedValue = count() by Computer, bin(TimeGenerated, 15m)
109+
```
110+
111+
82112
## Troubleshoot
83113
Use the following steps to troubleshoot collection of IIS logs.
84114

articles/azure-monitor/agents/data-collection-text-log.md

Lines changed: 25 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,9 +30,9 @@ To complete this procedure, you need:
3030

3131
This step will create a new custom table, which is any table name that ends in \_CL. Currently a direct REST call to the table management endpoint is used to create a table. The script at the end of this section is the input to the REST call.
3232

33-
The table created in the script has two columns TimeGenerated: datetime and RawData: string, which is the default schema for a custom text log. If you know your final schema, then you can add columns in the script before creating the table. If you do not, columns can always be added in the log analytics table UI.
33+
The table created in the script has two columns TimeGenerated: datetime and RawData: string, which is the default schema for a custom text log. If you know your final schema, then you can add columns in the script before creating the table. If you don't, columns can always be added in the log analytics table UI.
3434

35-
The easiest way to make the REST call is from an Azure Cloud PowerShell command line (CLI). To open the shell, go to the Azure Portal, press the Cloud Shell button, and select PowerShell. If this is your first-time using Azure Cloud PowerShell, you will need to walk through the one-time configuration wizard.
35+
The easiest way to make the REST call is from an Azure Cloud PowerShell command line (CLI). To open the shell, go to the Azure portal, press the Cloud Shell button, and select PowerShell. If this is your first-time using Azure Cloud PowerShell, you will need to walk through the one-time configuration wizard.
3636

3737

3838
Copy and paste the following script in to PowerShell to create the table in your workspace. Make sure to replace the {subscription}, {resource group}, {workspace name}, and {table name} in the script. Make sure that there are no extra blanks at the beginning or end of the parameters
@@ -325,6 +325,29 @@ To create the data collection rule in the Azure portal:
325325

326326
> [!NOTE]
327327
> It can take up to 5 minutes for data to be sent to the destinations after you create the data collection rule.
328+
329+
### Sample log queries
330+
The column names used here are for example only. The column names for your log will most likely be different.
331+
332+
- **Count the number of events by code.**
333+
334+
```kusto
335+
MyApp_CL
336+
| summarize count() by code
337+
```
338+
339+
### Sample alert rule
340+
341+
- **Create an alert rule on any error event.**
342+
343+
```kusto
344+
MyApp_CL
345+
| where status == "Error"
346+
| summarize AggregatedValue = count() by Computer, bin(TimeGenerated, 15m)
347+
```
348+
349+
350+
328351
## Troubleshoot
329352
Use the following steps to troubleshoot collection of text logs.
330353

articles/azure-monitor/best-practices-cost.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Since Azure Monitor charges for the collection of data, your goal should be to c
8080

8181
| Recommendation | Description |
8282
|:---|:---|
83-
| Configure VM agents to collect only critical events. | Virtual machines can vary significantly in the amount of data they collect, depending on the amount of telemetry generated by the applications and services they have installed. See [Monitor virtual machines with Azure Monitor: Workloads](vm/monitor-virtual-machine-workloads.md#controlling-costs) for guidance on data to collect and strategies for using XPath queries and transformations to limit it.|
83+
| Configure VM agents to collect only critical events. | Virtual machines can vary significantly in the amount of data they collect, depending on the amount of telemetry generated by the applications and services they have installed. See [Monitor virtual machines with Azure Monitor: Workloads](vm/monitor-virtual-machine-data-collection.md#controlling-costs) for guidance on data to collect and strategies for using XPath queries and transformations to limit it.|
8484
| Ensure that VMs aren't sending duplicate data. | Any configuration that uses multiple agents on a single machine or where you multi-home agents to send data to multiple workspaces may incur charges for the same data multiple times. If you do multi-home agents, make sure you're sending unique data to each workspace. See [Analyze usage in Log Analytics workspace](logs/analyze-usage.md) for guidance on analyzing your collected data to make sure you aren't collecting duplicate data. If you're migrating between agents, continue to use the Log Analytics agent until you [migrate to the Azure Monitor agent](./agents/azure-monitor-agent-migration.md) rather than using both together unless you can ensure that each is collecting unique data. |
8585

8686
#### Container insights

articles/azure-monitor/containers/container-insights-log-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ You might also decide not to split when you want a condition on multiple resourc
4343
You might want to see a list of the alerts by affected computer. You can use a custom workbook that uses a custom [resource graph](../../governance/resource-graph/overview.md) to provide this view. Use the following query to display alerts, and use the data source **Azure Resource Graph** in the workbook.
4444

4545
## Create a log query alert rule
46-
To create a log query alert rule by using the portal, see [this example of a log query alert](../vm/monitor-virtual-machine-alerts.md#example-log-query-alert), which provides a complete walkthrough. You can use these same processes to create alert rules for AKS clusters by using queries similar to the ones in this article.
46+
To create a log query alert rule by using the portal, see [this example of a log query alert](../alerts/tutorial-log-alert.md), which provides a complete walkthrough. You can use these same processes to create alert rules for AKS clusters by using queries similar to the ones in this article.
4747

4848
To create a query alert rule by using an Azure Resource Manager (ARM) template, see [Resource Manager template samples for log alert rules in Azure Monitor](../alerts/resource-manager-alerts-log.md). You can use these same processes to create ARM templates for the log queries in this article.
4949

articles/azure-monitor/toc.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -56,16 +56,16 @@ items:
5656
items:
5757
- name: Overview
5858
href: vm/monitor-virtual-machine.md
59-
- name: Configure monitoring
60-
href: vm/monitor-virtual-machine-configure.md
59+
- name: Deploy agents
60+
href: vm/monitor-virtual-machine-agent.md
61+
- name: Collect data
62+
href: vm/monitor-virtual-machine-data-collection.md
6163
- name: Analyze data
6264
href: vm/monitor-virtual-machine-analyze.md
63-
- name: Monitor security
64-
href: vm/monitor-virtual-machine-security.md
6565
- name: Create alerts
6666
href: vm/monitor-virtual-machine-alerts.md
67-
- name: Monitor workloads
68-
href: vm/monitor-virtual-machine-workloads.md
67+
- name: Migrate management pack logic
68+
href: vm/monitor-virtual-machine-management-packs.md
6969
- name: Enable recommended alerts
7070
href: vm/tutorial-monitor-vm-alert-recommended.md
7171
- name: Create availability alert

articles/azure-monitor/visualize/vmext-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ If the *Microsoft Monitoring Agent* VM extension is not installing or reporting,
3232
1. Check if the Azure VM agent is installed and working correctly by using the steps in [KB 2965986](https://support.microsoft.com/kb/2965986#mt1).
3333
* You can also review the VM agent log file `C:\WindowsAzure\logs\WaAppAgent.log`
3434
* If the log does not exist, the VM agent is not installed.
35-
* [Install the Azure VM Agent](../vm/monitor-virtual-machine.md#agents)
35+
* [Install the Azure VM Agent](../../virtual-machines/extensions/agent-windows.md#install-the-vm-agent)
3636
2. Review the Microsoft Monitoring Agent VM extension log files in `C:\Packages\Plugins\Microsoft.EnterpriseCloud.Monitoring.MicrosoftMonitoringAgent`
3737
3. Ensure the virtual machine can run PowerShell scripts
3838
4. Ensure permissions on C:\Windows\temp haven’t been changed
30.8 KB
Loading
57.1 KB
Loading

0 commit comments

Comments
 (0)