Skip to content

Commit 40f0fae

Browse files
Merge pull request #264521 from damendo/patch-3
Removing notice
2 parents efab6d5 + 0ae8a56 commit 40f0fae

File tree

1 file changed

+0
-3
lines changed

1 file changed

+0
-3
lines changed

articles/azure-monitor/containers/container-insights-syslog.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,6 @@ ms.reviewer: damendo
1010

1111
Container Insights offers the ability to collect Syslog events from Linux nodes in your [Azure Kubernetes Service (AKS)](../../aks/intro-kubernetes.md) clusters. This includes the ability to collect logs from control plane components like kubelet. Customers can also use Syslog for monitoring security and health events, typically by ingesting syslog into a SIEM system like [Microsoft Sentinel](https://azure.microsoft.com/products/microsoft-sentinel/#overview).
1212

13-
> [!IMPORTANT]
14-
> Syslog collection is now GA. However due to slower rollouts towards the year end, the agent version with the GA changes will not be in all regions until the end of January 2024. Agent versions 3.1.16 and above have Syslog GA changes. Please check agent version before enabling in production.
15-
1613
## Prerequisites
1714

1815
- You need to have managed identity authentication enabled on your cluster. To enable, see [migrate your AKS cluster to managed identity authentication](container-insights-enable-existing-clusters.md?tabs=azure-cli#migrate-to-managed-identity-authentication). Note: Enabling Managed Identity will create a new Data Collection Rule (DCR) named `MSCI-<WorkspaceRegion>-<ClusterName>`

0 commit comments

Comments
 (0)