Skip to content

Commit 42061f5

Browse files
authored
Merge pull request #177162 from vhorne/fw-diag
fix workspace resource ID in CLI
2 parents 06dd1e4 + bcfee3c commit 42061f5

File tree

1 file changed

+13
-5
lines changed

1 file changed

+13
-5
lines changed

articles/firewall/firewall-diagnostics.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 08/03/2021
8+
ms.date: 10/22/2021
99
ms.author: victorh
1010
#Customer intent: As an administrator, I want monitor Azure Firewall logs and metrics so that I can track firewall activity.
1111
---
@@ -50,11 +50,15 @@ Activity logging is automatically enabled for every Resource Manager resource. D
5050

5151
To enable diagnostic logging with PowerShell, use the following steps:
5252

53-
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>`.
53+
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form:
54+
55+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>`
5456

5557
You can use any workspace in your subscription. You can use the Azure portal to find this information. The information is located in the resource **Properties** page.
5658

57-
2. Note the resource ID for the firewall. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`.
59+
2. Note the resource ID for the firewall. This value is of the form:
60+
61+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`
5862

5963
You can use the portal to find this information.
6064

@@ -76,11 +80,15 @@ Activity logging is automatically enabled for every Resource Manager resource. D
7680

7781
To enable diagnostic logging with Azure CLI, use the following steps:
7882

79-
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`.
83+
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form:
84+
85+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>`
8086

8187
You can use any workspace in your subscription. You can use the Azure portal to find this information. The information is located in the resource **Properties** page.
8288

83-
2. Note the resource ID for the firewall. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`.
89+
2. Note the resource ID for the firewall. This value is of the form:
90+
91+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`
8492

8593
You can use the portal to find this information.
8694

0 commit comments

Comments
 (0)