You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/firewall-diagnostics.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: how-to
8
-
ms.date: 08/03/2021
8
+
ms.date: 10/22/2021
9
9
ms.author: victorh
10
10
#Customer intent: As an administrator, I want monitor Azure Firewall logs and metrics so that I can track firewall activity.
11
11
---
@@ -50,11 +50,15 @@ Activity logging is automatically enabled for every Resource Manager resource. D
50
50
51
51
To enable diagnostic logging with PowerShell, use the following steps:
52
52
53
-
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>`.
53
+
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form:
54
+
55
+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>`
54
56
55
57
You can use any workspace in your subscription. You can use the Azure portal to find this information. The information is located in the resource **Properties** page.
56
58
57
-
2. Note the resource ID for the firewall. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`.
59
+
2. Note the resource ID for the firewall. This value is of the form:
60
+
61
+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`
58
62
59
63
You can use the portal to find this information.
60
64
@@ -76,11 +80,15 @@ Activity logging is automatically enabled for every Resource Manager resource. D
76
80
77
81
To enable diagnostic logging with Azure CLI, use the following steps:
78
82
79
-
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`.
83
+
1. Note your Log Analytics Workspace resource ID, where the log data is stored. This value is of the form:
84
+
85
+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>`
80
86
81
87
You can use any workspace in your subscription. You can use the Azure portal to find this information. The information is located in the resource **Properties** page.
82
88
83
-
2. Note the resource ID for the firewall. This value is of the form: `/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`.
89
+
2. Note the resource ID for the firewall. This value is of the form:
90
+
91
+
`/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>`
0 commit comments