Skip to content

Commit 316d7e3

Browse files
committed
Minor edits
1 parent 5938738 commit 316d7e3

File tree

2 files changed

+13
-16
lines changed

2 files changed

+13
-16
lines changed

articles/network-watcher/network-watcher-alert-triggered-packet-capture.md

Lines changed: 13 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ By using Network Watcher, alerting and functions from within the Azure ecosystem
3535

3636
In this example, your VM is utilizing more CPU percentage than usual and you want to be alerted. CPU percentage is used as an example here, but you can use any alert condition.
3737

38-
When you're alerted, the packet-level data helps to understand why communication has increased. You can take steps to return the virtual machine to regular communication.
38+
When you're alerted, the packet-level data helps to understand why utilization has increased. You can take steps to return the virtual machine to regular utilization.
3939

4040
This scenario assumes that you have an existing instance of Network Watcher and a resource group with a valid Virtual machine.
4141

@@ -128,7 +128,7 @@ $Encryptedpassword
128128

129129
In the App Service Editor of the function app, create a folder called **keys** under **AlertPacketCapturePowerShell**. Upload the **PassEncryptKey.key** file that you created in the previous PowerShell sample.
130130

131-
![Functions key][functions8]
131+
:::image type="content" source="./media/network-watcher-alert-triggered-packet-capture/key-function.png" alt-text="Screenshot of the Encryption key.":::
132132

133133
### Retrieve values for environment variables
134134

@@ -140,7 +140,7 @@ The final requirement is to set up the environment variables that are necessary
140140

141141
#### AzureClientID
142142

143-
The client ID is the Application ID of an application in Azure Active Directory.
143+
The client ID is the Application ID of an application in the Azure Active Directory.
144144

145145
1. If you don't already have an application to use, run the following example to create an application.
146146

@@ -408,14 +408,14 @@ Go to an existing virtual machine and [add an alert rule](../azure-monitor/alert
408408

409409
2. In the **Conditions** tab, set the following values and select **Next: Actions >**.
410410

411-
|**Setting** | **Value** |
412-
|---|---|
413-
|**Threshold**|Static|
414-
|**Aggregation type**|Average|
415-
|**Operator**|Greater than|
416-
|**Threshold value**|3|
417-
|**Check every**|1 minute|
418-
|**Lookback period**|5 minutes|
411+
|**Setting** | **Value** |
412+
|---|---|
413+
|**Threshold**|Static|
414+
|**Aggregation type**|Average|
415+
|**Operator**|Greater than|
416+
|**Threshold value**|3|
417+
|**Check every**|1 minute|
418+
|**Lookback period**|5 minutes|
419419

420420
3. In the **Actions** tab, select **Create an action group**.
421421
4. In the **Create action group** screen, select the **Subscription**, **Resource group**, and **Region**. Also enter the Action group name and the display name and select **Next: Notifications >**.
@@ -430,12 +430,9 @@ After the criteria for the alert triggers, a packet capture is created. Go to Ne
430430

431431
If the capture file is stored locally, you can retrieve it by signing in to the virtual machine.
432432

433-
For instructions about downloading files from Azure storage accounts, see [Get started with Azure Blob storage using .NET](../storage/blobs/storage-quickstart-blobs-dotnet.md). Another tool you can use is [Storage Explorer](https://storageexplorer.com/).
433+
For instructions on downloading files from Azure storage accounts, see [Get started with Azure Blob storage using .NET](../storage/blobs/storage-quickstart-blobs-dotnet.md). You can also use the [Storage Explorer](https://storageexplorer.com/) tool.
434434

435-
After your capture has been downloaded, you can view it by using any tool that can read a **.cap** file. Following are links to two of these tools:
436-
437-
- [Microsoft Message Analyzer](/message-analyzer/microsoft-message-analyzer-operating-guide)
438-
- [WireShark](https://www.wireshark.org/)
435+
After your capture has been downloaded, you can view it using tools like [Microsoft Message Analyzer](/message-analyzer/microsoft-message-analyzer-operating-guide) and [WireShark](https://www.wireshark.org/)that can read a **.cap** file.
439436

440437
## Next steps
441438

0 commit comments

Comments
 (0)