You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/traffic-analytics-policy-portal.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,13 +2,13 @@
2
2
title: Manage traffic analytics using Azure Policy
3
3
titleSuffix: Azure Network Watcher
4
4
description: Learn how to use Azure Policy built-in policies to audit Azure Network Watcher NSG flow logs and manage the deployment of traffic analytics.
5
-
services: network-watcher
6
5
author: halkazwini
6
+
ms.author: halkazwini
7
7
ms.service: network-watcher
8
8
ms.topic: how-to
9
-
ms.date: 05/30/2023
10
-
ms.author: halkazwini
11
-
ms.custom: template-how-to, engagement-fy23
9
+
ms.date: 05/30/2024
10
+
11
+
#CustomerIntent: As an Azure administrator, I want to use Azure Policy to audit and deploy traffic analytics.
12
12
---
13
13
14
14
# Manage traffic analytics using Azure Policy
@@ -27,7 +27,7 @@ To audit your flow logs by using the built-in policy:
27
27
28
28
1. In the search box at the top of the portal, enter *policy*. Select **Policy** in the search results.
29
29
30
-
:::image type="content" source="./media/traffic-analytics-policy-portal/azure-portal.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/azure-portal.png":::
30
+
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-portal-search.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-portal-search.png":::
31
31
32
32
1. Select **Assignments**, then select on **Assign Policy**.
33
33
@@ -77,7 +77,7 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
77
77
78
78
1. In the search box at the top of the portal, enter *policy*. Select **Policy** in the search results.
79
79
80
-
:::image type="content" source="./media/traffic-analytics-policy-portal/azure-portal.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/azure-portal.png":::
80
+
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-portal-search.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-portal-search.png":::
81
81
82
82
1. Select **Assignments**, and then select on **Assign policy**.
83
83
@@ -101,9 +101,9 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
101
101
| --- | --- |
102
102
| Effect | Select **DeployIfNotExists**. |
103
103
| Network security group region | Select the region of your network security group that you're targeting with the policy. |
104
-
| Storage resource ID | Enter the full resource ID of the storage account. The storage account must be in the same region as the network security group. The format of storage resource ID is: `/subscriptions/<SubscriptionID>/resourceGroups/<ResouceGroupName>/providers/Microsoft.Storage/storageAccounts/<StorageAccountName>`. |
104
+
| Storage resource ID | Enter the full resource ID of the storage account. The storage account must be in the same region as the network security group. The format of storage resource ID is: `/subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Storage/storageAccounts/<StorageAccountName>`. |
105
105
| Traffic analytics processing interval in minutes | Select the frequency at which processed logs are pushed into the workspace. Currently available values are 10 and 60 minutes. Default value is 60 minutes. |
106
-
| Workspace resource ID | Enter the full resource ID of the workspace where traffic analytics has to be enabled. The format of workspace resource ID is: `/subscriptions/<SubscriptionID>/resourcegroups/<ResouceGroupName>/providers/microsoft.operationalinsights/workspaces/<WorkspaceName>`. |
106
+
| Workspace resource ID | Enter the full resource ID of the workspace where traffic analytics has to be enabled. The format of workspace resource ID is: `/subscriptions/<SubscriptionID>/resourcegroups/<ResourceGroupName>/providers/microsoft.operationalinsights/workspaces/<WorkspaceName>`. |
107
107
| Workspace region | Select the region of your traffic analytics workspace. |
108
108
| Workspace ID | Enter your traffic analytics workspace ID. |
109
109
| Network Watcher resource group | Select the resource group of your Network Watcher. |
In such scenario, the managed identity must be manually granted access. Go to the appropriate subscription/resource group (containing the resources provided in the policy parameters) and grant contributor access to the managed identity created by the policy.
149
149
150
-
## Next steps
150
+
## Related content
151
151
152
152
- Learn about [NSG flow logs built-in policies](./nsg-flow-logs-policy-portal.md).
153
153
- Learn more about [traffic analytics](./traffic-analytics.md).
0 commit comments