Skip to content

Commit 478c925

Browse files
committed
edit pass: agents-articles-batch-5
1 parent 3e745c5 commit 478c925

File tree

3 files changed

+136
-134
lines changed

3 files changed

+136
-134
lines changed

articles/azure-monitor/agents/agent-linux.md

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -27,8 +27,7 @@ The following sections outline the requirements for installation.
2727

2828
For a list of Linux distributions supported by the Log Analytics agent, see [Overview of Azure Monitor agents](agents-overview.md#supported-operating-systems).
2929

30-
>[!NOTE]
31-
>OpenSSL 1.1.0 is only supported on x86_x64 platforms (64-bit). OpenSSL earlier than 1.x isn't supported on any platform.
30+
OpenSSL 1.1.0 is only supported on x86_x64 platforms (64-bit). OpenSSL earlier than 1.x isn't supported on any platform.
3231

3332
>[!NOTE]
3433
>The Log Analytics Linux agent doesn't run in containers. To monitor containers, use the [Container Monitoring solution](../containers/containers.md) for Docker hosts or [Container insights](../containers/container-insights-overview.md) for Kubernetes.
@@ -52,11 +51,11 @@ Starting from agent version 1.13.27, the Linux agent will support both Python 2
5251

5352
If you're using an older version of the agent, you must have the virtual machine use Python 2 by default. If your virtual machine is using a distro that doesn't include Python 2 by default, then you must install it. The following sample commands will install Python 2 on different distros:
5453

55-
- Red Hat, CentOS, Oracle: `yum install -y python2`
56-
- Ubuntu, Debian: `apt-get install -y python2`
57-
- SUSE: `zypper install -y python2`
54+
- **Red Hat, CentOS, Oracle**: `yum install -y python2`
55+
- **Ubuntu, Debian**: `apt-get install -y python2`
56+
- **SUSE**: `zypper install -y python2`
5857

59-
Again, only if you're using an older version of the agent, the python2 executable must be aliased to *python*. Following is one method that you can use to set this alias:
58+
Again, only if you're using an older version of the agent, the python2 executable must be aliased to *python*. Use the following method to set this alias:
6059

6160
1. Run the following command to remove any existing aliases:
6261

@@ -89,15 +88,15 @@ The following table highlights the packages required for [supported Linux distro
8988
9089
|Required package |Description |Minimum version |
9190
|-----------------|------------|----------------|
92-
|Glibc | GNU C Library | 2.5-12
93-
|Openssl | OpenSSL Libraries | 1.0.x or 1.1.x |
91+
|Glibc | GNU C library | 2.5-12
92+
|Openssl | OpenSSL libraries | 1.0.x or 1.1.x |
9493
|Curl | cURL web client | 7.15.5 |
9594
|Python | | 2.7 or 3.6+
9695
|Python-ctypes | |
97-
|PAM | Pluggable Authentication Modules | |
96+
|PAM | Pluggable authentication modules | |
9897
9998
>[!NOTE]
100-
>Either rsyslog or syslog-ng are required to collect syslog messages. The default syslog daemon on version 5 of Red Hat Enterprise Linux, CentOS, and Oracle Linux version (sysklog) isn't supported for syslog event collection. To collect syslog data from this version of these distributions, the rsyslog daemon should be installed and configured to replace sysklog.
99+
>Either rsyslog or syslog-ng is required to collect syslog messages. The default syslog daemon on version 5 of Red Hat Enterprise Linux, CentOS, and Oracle Linux version (sysklog) isn't supported for syslog event collection. To collect syslog data from this version of these distributions, the rsyslog daemon should be installed and configured to replace sysklog.
101100
102101
### Network requirements
103102
For the network requirements for the Linux agent, see [Log Analytics agent overview](./log-analytics-agent.md#network-requirements).
@@ -114,9 +113,9 @@ The Log Analytics agent for Linux is composed of multiple packages. The release
114113
115114
Package | Version | Description
116115
----------- | ----------- | --------------
117-
omsagent | 1.14.19 | The Log Analytics Agent for Linux.
116+
omsagent | 1.14.19 | The Log Analytics agent for Linux.
118117
omsconfig | 1.1.1 | Configuration agent for the Log Analytics agent.
119-
omi | 1.6.9 | Open Management Infrastructure (OMI), a lightweight CIM Server. *Note that OMI requires root access to run a cron job necessary for the functioning of the service*.
118+
omi | 1.6.9 | Open Management Infrastructure (OMI), a lightweight CIM Server. *OMI requires root access to run a cron job necessary for the functioning of the service*.
120119
scx | 1.6.9 | OMI CIM providers for operating system performance metrics.
121120
apache-cimprov | 1.0.1 | Apache HTTP Server performance monitoring provider for OMI. Only installed if Apache HTTP Server is detected.
122121
mysql-cimprov | 1.0.1 | MySQL Server performance monitoring provider for OMI. Only installed if MySQL/MariaDB server is detected.
@@ -132,17 +131,17 @@ Installing the Log Analytics agent for Linux packages also applies the following
132131
* A sudoers *include* file is created in `/etc/sudoers.d/omsagent`. This file authorizes `omsagent` to restart the syslog and omsagent daemons. If sudo *include* directives aren't supported in the installed version of sudo, these entries will be written to `/etc/sudoers`.
133132
* The syslog configuration is modified to forward a subset of events to the agent. For more information, see [Configure Syslog data collection](data-sources-syslog.md).
134133
135-
On a monitored Linux computer, the agent is listed as `omsagent`. `omsconfig` is the Log Analytics agent for the Linux configuration agent that looks for new portal side configuration every 5 minutes. The new and updated configuration is applied to the agent configuration files located at `/etc/opt/microsoft/omsagent/conf/omsagent.conf`.
134+
On a monitored Linux computer, the agent is listed as `omsagent`. `omsconfig` is the Log Analytics agent for the Linux configuration agent that looks for new portal-side configuration every 5 minutes. The new and updated configuration is applied to the agent configuration files located at `/etc/opt/microsoft/omsagent/conf/omsagent.conf`.
136135
137136
## Install the agent
138137
139138
[!INCLUDE [Log Analytics agent deprecation](../../../includes/log-analytics-agent-deprecation.md)]
140139
141140
### [Wrapper script](#tab/wrapper-script)
142141
143-
The following steps configure setup of the agent for Log Analytics in Azure and Azure Government cloud by using the wrapper script for Linux computers that can communicate directly or through a proxy server to download the agent hosted on GitHub and install the agent.
142+
The following steps configure setup of the agent for Log Analytics in Azure and Azure Government cloud. A wrapper script is used for Linux computers that can communicate directly or through a proxy server to download the agent hosted on GitHub and install the agent.
144143
145-
If your Linux computer needs to communicate through a proxy server to Log Analytics, this configuration can be specified on the command line by including `-p [protocol://][user:password@]proxyhost[:port]`. The *protocol* property accepts `http` or `https`. The `proxyhost` property accepts a fully qualified domain name or IP address of the proxy server.
144+
If your Linux computer needs to communicate through a proxy server to Log Analytics, this configuration can be specified on the command line by including `-p [protocol://][user:password@]proxyhost[:port]`. The `protocol` property accepts `http` or `https`. The `proxyhost` property accepts a fully qualified domain name or IP address of the proxy server.
146145
147146
For example: `https://proxy01.contoso.com:30443`
148147
@@ -189,7 +188,7 @@ The Log Analytics agent for Linux is provided in a self-extracting and installab
189188
1. Install the bundle by using the `--install` argument. To onboard to a Log Analytics workspace during installation, provide the `-w <WorkspaceID>` and `-s <workspaceKey>` parameters copied earlier.
190189
191190
>[!NOTE]
192-
> Use the `--upgrade` argument if any dependent packages, such as omi, scx, omsconfig or their older versions, are installed. This would be the case if the System Center Operations Manager agent for Linux is already installed.
191+
> Use the `--upgrade` argument if any dependent packages, such as omi, scx, omsconfig, or their older versions, are installed. This would be the case if the System Center Operations Manager agent for Linux is already installed.
193192
194193
```
195194
sudo sh ./omsagent-*.universal.x64.sh --install -w <workspace id> -s <shared key> --skip-docker-provider-install
@@ -198,7 +197,7 @@ The Log Analytics agent for Linux is provided in a self-extracting and installab
198197
> [!NOTE]
199198
> The preceding command uses the optional `--skip-docker-provider-install` flag to disable the Container Monitoring data collection because the [Container Monitoring solution](../containers/containers.md) is being retired.
200199
201-
1. To configure the Linux agent to install and connect to a Log Analytics workspace through a Log Analytics gateway, run the following command that provides the proxy, workspace ID, and workspace key parameters. This configuration can be specified on the command line by including `-p [protocol://][user:password@]proxyhost[:port]`. The `proxyhost` property accepts a fully qualified domain name or IP address of the Log Analytics gateway server.
200+
1. To configure the Linux agent to install and connect to a Log Analytics workspace through a Log Analytics gateway, run the following command. It provides the proxy, workspace ID, and workspace key parameters. This configuration can be specified on the command line by including `-p [protocol://][user:password@]proxyhost[:port]`. The `proxyhost` property accepts a fully qualified domain name or IP address of the Log Analytics gateway server.
202201
203202
```
204203
sudo sh ./omsagent-*.universal.x64.sh --upgrade -p https://<proxy address>:<proxy port> -w <workspace id> -s <shared key>
@@ -210,7 +209,7 @@ The Log Analytics agent for Linux is provided in a self-extracting and installab
210209
sudo sh ./omsagent-*.universal.x64.sh --upgrade -p https://<proxy user>:<proxy password>@<proxy address>:<proxy port> -w <workspace id> -s <shared key>
211210
```
212211
213-
1. To configure the Linux computer to connect to a Log Analytics workspace in Azure Government cloud, run the following command that provides the workspace ID and primary key copied earlier.
212+
1. To configure the Linux computer to connect to a Log Analytics workspace in Azure Government cloud, run the following command that provides the workspace ID and primary key copied earlier:
214213
215214
```
216215
sudo sh ./omsagent-*.universal.x64.sh --upgrade -w <workspace id> -s <shared key> -d opinsights.azure.us
@@ -235,7 +234,7 @@ sudo sh ./omsagent-*.universal.x64.sh --extract
235234
Upgrading from a previous version, starting with version 1.0.0-47, is supported in each release. Perform the installation with the `--upgrade` parameter to upgrade all components of the agent to the latest version.
236235
237236
> [!NOTE]
238-
> There will be a warning message during the upgrade "docker provider package installation skipped" since `--skip-docker-provider-install` flag is set. If you're installing over an existing omsagent install and want to remove the docker provider, you should first purge the existing installation and then install by using the `--skip-docker-provider-install` flag.
237+
> The warning message "docker provider package installation skipped" appears during the upgrade because the `--skip-docker-provider-install` flag is set. If you're installing over an existing `omsagent` installation and want to remove the docker provider, purge the existing installation first. Then install by using the `--skip-docker-provider-install` flag.
239238
240239
## Cache information
241240
Data from the Log Analytics agent for Linux is cached on the local machine at *%STATE_DIR_WS%/out_oms_common*.buffer* before it's sent to Azure Monitor. Custom log data is buffered in *%STATE_DIR_WS%/out_oms_blob*.buffer*. The path might be different for some [solutions and data types](https://github.com/microsoft/OMS-Agent-for-Linux/search?utf8=%E2%9C%93&q=+buffer_path&type=).
@@ -248,4 +247,4 @@ The default cache size is 10 MB but can be modified in the [omsagent.conf file](
248247
249248
- Review [Managing and maintaining the Log Analytics agent for Windows and Linux](agent-manage.md) to learn about how to reconfigure, upgrade, or remove the agent from the virtual machine.
250249
- Review [Troubleshooting the Linux agent](agent-linux-troubleshoot.md) if you encounter issues while you're installing or managing the agent.
251-
- Review [Agent Data Sources](./agent-data-sources.md) to learn about data source configuration.
250+
- Review [Agent data sources](./agent-data-sources.md) to learn about data source configuration.

articles/azure-monitor/agents/data-sources-iis-logs.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,57 +1,57 @@
11
---
2-
title: Collect IIS logs with Log Analytics agent in Azure Monitor
3-
description: Internet Information Services (IIS) stores user activity in log files that can be collected by Azure Monitor. This article describes how to configure collection of IIS logs and details of the records they create in Azure Monitor.
2+
title: Collect IIS logs with the Log Analytics agent in Azure Monitor
3+
description: This article describes how to configure collection of IIS log files that store user activity and the details of the records they create in Azure Monitor.
44
ms.topic: conceptual
55
ms.date: 03/31/2022
66
ms.reviewer: JeffWo
77

88
---
99

10-
# Collect IIS logs with Log Analytics agent in Azure Monitor
10+
# Collect IIS logs with the Log Analytics agent in Azure Monitor
1111
Internet Information Services (IIS) stores user activity in log files that can be collected by the Log Analytics agent and stored in [Azure Monitor Logs](../data-platform.md).
1212

13-
![IIS logs](media/data-sources-iis-logs/overview.png)
13+
![Diagram that shows IIS logs.](media/data-sources-iis-logs/overview.png)
1414

1515
> [!IMPORTANT]
16-
> This article covers collecting IIS logs with the [Log Analytics agent](./log-analytics-agent.md), which **will be deprecated by August 2024**. Please be sure to [migrate to Azure Monitor agent](./azure-monitor-agent-manage.md) before August 2024 to continue ingesting data. See [Collect text logs with Azure Monitor agent (preview)](../agents/data-collection-text-log.md) for details on collecting IIS logs with [Azure Monitor agent](azure-monitor-agent-overview.md).
16+
> This article covers collecting IIS logs with the [Log Analytics agent](./log-analytics-agent.md), which **will be deprecated by August 2024**. Be sure to [migrate to Azure Monitor Agent](./azure-monitor-agent-manage.md) before August 2024 to continue ingesting data. See [Collect text logs with Azure Monitor Agent (preview)](../agents/data-collection-text-log.md) for details on collecting IIS logs with [Azure Monitor Agent](azure-monitor-agent-overview.md).
1717
18-
19-
## Configuring IIS logs
18+
## Configure IIS logs
2019
Azure Monitor collects entries from log files created by IIS, so you must [configure IIS for logging](/previous-versions/orphan-topics/ws.11/hh831775(v=ws.11)).
2120

22-
Azure Monitor only supports IIS log files stored in W3C format and does not support custom fields or IIS Advanced Logging. It does not collect logs in NCSA or IIS native format.
23-
24-
Configure IIS logs in Azure Monitor from the [Agent configuration menu](../agents/agent-data-sources.md#configure-data-sources) for the Log Analytics agent. There is no configuration required other than selecting **Collect W3C format IIS log files**.
21+
Azure Monitor only supports IIS log files stored in W3C format and doesn't support custom fields or IIS Advanced Logging. It doesn't collect logs in NCSA or IIS native format.
2522

23+
Configure IIS logs in Azure Monitor from the [Agent configuration menu](../agents/agent-data-sources.md#configure-data-sources) for the Log Analytics agent. No configuration is required other than selecting **Collect W3C format IIS log files**.
2624

2725
## Data collection
28-
Azure Monitor collects IIS log entries from each agent each time the log timestamp changes. The log is read every **5 minutes**. If for any reason IIS doesn't update the timestamp before the rollover time when a new file is created, entries will be collected following creation of the new file. The frequency of new file creation is controlled by the **Log File Rollover Schedule** setting for the IIS site, which is once a day by default. If the setting is **Hourly**, Azure Monitor collects the log each hour. If the setting is **Daily**, Azure Monitor collects the log every 24 hours.
26+
Azure Monitor collects IIS log entries from each agent each time the log timestamp changes. The log is read every 5 minutes. If for any reason IIS doesn't update the timestamp before the rollover time when a new file is created, entries will be collected following creation of the new file.
27+
28+
The frequency of new file creation is controlled by the **Log File Rollover Schedule** setting for the IIS site. The setting is once a day by default. If the setting is **Hourly**, Azure Monitor collects the log each hour. If the setting is **Daily**, Azure Monitor collects the log every 24 hours.
2929

3030
> [!IMPORTANT]
31-
> It is recommended to set the **Log File Rollover Schedule** to **Hourly**. If it's set to **Daily**, you may experience spikes in your data since it will only be collected once per day.
31+
> We recommend that you set **Log File Rollover Schedule** to **Hourly**. If it's set to **Daily**, you might experience spikes in your data because it will be collected only once per day.
3232
3333
## IIS log record properties
34-
IIS log records have a type of **W3CIISLog** and have the properties in the following table:
34+
IIS log records have a type of **W3CIISLog** and have the properties shown in the following table:
3535

3636
| Property | Description |
3737
|:--- |:--- |
3838
| Computer |Name of the computer that the event was collected from. |
3939
| cIP |IP address of the client. |
40-
| csMethod |Method of the request such as GET or POST. |
40+
| csMethod |Method of the request, such as GET or POST. |
4141
| csReferer |Site that the user followed a link from to the current site. |
4242
| csUserAgent |Browser type of the client. |
4343
| csUserName |Name of the authenticated user that accessed the server. Anonymous users are indicated by a hyphen. |
44-
| csUriStem |Target of the request such as a web page. |
44+
| csUriStem |Target of the request, such as a webpage. |
4545
| csUriQuery |Query, if any, that the client was trying to perform. |
46-
| ManagementGroupName |Name of the management group for Operations Manager agents. For other agents, this is AOI-\<workspace ID\> |
46+
| ManagementGroupName |Name of the management group for Operations Manager agents. For other agents, this name is AOI-\<workspace ID\>. |
4747
| RemoteIPCountry |Country/region of the IP address of the client. |
4848
| RemoteIPLatitude |Latitude of the client IP address. |
4949
| RemoteIPLongitude |Longitude of the client IP address. |
5050
| scStatus |HTTP status code. |
5151
| scSubStatus |Substatus error code. |
5252
| scWin32Status |Windows status code. |
5353
| sIP |IP address of the web server. |
54-
| SourceSystem |OpsMgr |
54+
| SourceSystem |OpsMgr. |
5555
| sPort |Port on the server the client connected to. |
5656
| sSiteName |Name of the IIS site. |
5757
| TimeGenerated |Date and time the entry was logged. |
@@ -60,7 +60,7 @@ IIS log records have a type of **W3CIISLog** and have the properties in the foll
6060
| csBytes | Number of bytes that the server received. |
6161

6262
## Log queries with IIS logs
63-
The following table provides different examples of log queries that retrieve IIS log records.
63+
Different examples of log queries that retrieve IIS log records are shown in the following table:
6464

6565
| Query | Description |
6666
|:--- |:--- |

0 commit comments

Comments
 (0)