You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/search-monitor-usage.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.date: 02/15/2020
15
15
16
16
This article introduces monitoring at the service (resource) level, at the workload level (queries and indexing), and suggests a framework for monitoring user access.
17
17
18
-
Across the spectrum, you'll use a combination of built-in infrastructure and foundational services like Azure Monitor, as well as service APIs that return statistics, counts, and status. Understanding the range of capabilities will help you configure or create an effective communication system for proactive responses to problems as they emerge.
18
+
Across the spectrum, you'll use a combination of built-in infrastructure and foundational services like Azure Monitor, as well as service APIs that return statistics, counts, and status. Understanding the range of capabilities can help you construct a feedback loop so that you can address problems as they emerge.
19
19
20
20
## Use Azure Monitor
21
21
@@ -48,9 +48,9 @@ Tabbed pages built into the Overview page report out on resource usage. This inf
48
48
49
49
If you are finalizing decisions about [which tier to use for production workloads](search-sku-tier.md), or whether to [adjust the number of active replicas and partitions](search-capacity-planning.md), these metrics can help you with those decisions by showing you how quickly resources are consumed and how well the current configuration handles the existing load.
50
50
51
-
Alerts related to storage are not currently available; storage consumption is not aggregated or logged into **AzureMetrics**. You would need to build a custom solution to get resource-related notifications.
51
+
Alerts related to storage are not currently available; storage consumption is not aggregated or logged into the **AzureMetrics** table in Azure Monitor. You would need to build a custom solution that emits resource-related notifications, where your code checks for storage size and handles the response. For more information about storage metrics, see [Get Service Statistics](https://docs.microsoft.com/rest/api/searchservice/get-service-statistics#response).
52
52
53
-
In the portal, the **Usage** tab shows you resource availability relative to current [limits](search-limits-quotas-capacity.md) imposed by the service tier.
53
+
For visual monitoring in the portal, the **Usage** tab shows you resource availability relative to current [limits](search-limits-quotas-capacity.md) imposed by the service tier.
54
54
55
55
The following illustration is for the free service, which is capped at 3 objects of each type and 50 MB of storage. A Basic or Standard service has higher limits, and if you increase the partition counts, maximum storage goes up proportionally.
56
56
@@ -59,7 +59,7 @@ The following illustration is for the free service, which is capped at 3 objects
59
59
60
60
## Monitor workloads
61
61
62
-
Logged events includes those related to indexing and queries. The **Azure Diagnostics** table in Log Analytics collects operational data related to queries and indexing.
62
+
Logged events includes those related to indexing and queries. The **AzureDiagnostics** table in Log Analytics collects operational data related to queries and indexing.
63
63
64
64
Most of the logged data is for read-only operations. For other create-update-delete operations not captured in the log, you can query the search service for system information.
65
65
@@ -111,9 +111,9 @@ Both the Azure Cognitive Search REST API and the .NET SDK provide programmatic a
111
111
112
112
## Monitor user access
113
113
114
-
Because search indexes are a component of a larger client application, there is no built-in, per-user methodology for controlling access to an index. Requests are assumed to come from a client application, for either admin or query requests. Admin read-write operations include creating, updating, deleting objects across the entire service. Read-only operations are queries against the documents collection, scoped to a single index.
114
+
Because search indexes are a component of a larger client application, there is no built-inmethodology for controlling or monitoring per-user access to an index. Requests are assumed to come from a client application, for either admin or query requests. Admin read-write operations include creating, updating, deleting objects across the entire service. Read-only operations are queries against the documents collection, scoped to a single index.
115
115
116
-
As such, what you'll see in the logs are references to calls using admin keys or query keys. The appropriate key is included in requests originating from client code. The service is not equipped to handle identity tokens or impersonation.
116
+
As such, what you'll see in the activity logs are references to calls using admin keys or query keys. The appropriate key is included in requests originating from client code. The service is not equipped to handle identity tokens or impersonation.
117
117
118
118
When business requirements do exist for per-user authorization, the recommendation is integration with Azure Active Directory. You can use $filter and user identities to [trim search results](search-security-trimming-for-azure-search-with-aad.md) of documents that a user should not see.
0 commit comments