Skip to content

Commit 665be89

Browse files
authored
Merge pull request #276747 from halkazwini/nw-policy-ta
Network Watcher: Freshness: Manage traffic analytics using Azure Policy
2 parents d67c398 + 88cb222 commit 665be89

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed
Binary file not shown.
96.1 KB
Loading

articles/network-watcher/traffic-analytics-policy-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
title: Manage traffic analytics using Azure Policy
33
titleSuffix: Azure Network Watcher
44
description: Learn how to use Azure Policy built-in policies to audit Azure Network Watcher NSG flow logs and manage the deployment of traffic analytics.
5-
services: network-watcher
65
author: halkazwini
6+
ms.author: halkazwini
77
ms.service: network-watcher
88
ms.topic: how-to
9-
ms.date: 05/30/2023
10-
ms.author: halkazwini
11-
ms.custom: template-how-to, engagement-fy23
9+
ms.date: 05/30/2024
10+
11+
#CustomerIntent: As an Azure administrator, I want to use Azure Policy to audit and deploy traffic analytics.
1212
---
1313

1414
# Manage traffic analytics using Azure Policy
@@ -27,7 +27,7 @@ To audit your flow logs by using the built-in policy:
2727

2828
1. In the search box at the top of the portal, enter *policy*. Select **Policy** in the search results.
2929

30-
:::image type="content" source="./media/traffic-analytics-policy-portal/azure-portal.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/azure-portal.png":::
30+
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-portal-search.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-portal-search.png":::
3131

3232
1. Select **Assignments**, then select on **Assign Policy**.
3333

@@ -77,7 +77,7 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
7777

7878
1. In the search box at the top of the portal, enter *policy*. Select **Policy** in the search results.
7979

80-
:::image type="content" source="./media/traffic-analytics-policy-portal/azure-portal.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/azure-portal.png":::
80+
:::image type="content" source="./media/traffic-analytics-policy-portal/policy-portal-search.png" alt-text="Screenshot of searching for policy in the Azure portal." lightbox="./media/traffic-analytics-policy-portal/policy-portal-search.png":::
8181

8282
1. Select **Assignments**, and then select on **Assign policy**.
8383

@@ -101,9 +101,9 @@ To assign any of the *deployIfNotExists* two policies, follow these steps:
101101
| --- | --- |
102102
| Effect | Select **DeployIfNotExists**. |
103103
| Network security group region | Select the region of your network security group that you're targeting with the policy. |
104-
| Storage resource ID | Enter the full resource ID of the storage account. The storage account must be in the same region as the network security group. The format of storage resource ID is: `/subscriptions/<SubscriptionID>/resourceGroups/<ResouceGroupName>/providers/Microsoft.Storage/storageAccounts/<StorageAccountName>`. |
104+
| Storage resource ID | Enter the full resource ID of the storage account. The storage account must be in the same region as the network security group. The format of storage resource ID is: `/subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Storage/storageAccounts/<StorageAccountName>`. |
105105
| Traffic analytics processing interval in minutes | Select the frequency at which processed logs are pushed into the workspace. Currently available values are 10 and 60 minutes. Default value is 60 minutes. |
106-
| Workspace resource ID | Enter the full resource ID of the workspace where traffic analytics has to be enabled. The format of workspace resource ID is: `/subscriptions/<SubscriptionID>/resourcegroups/<ResouceGroupName>/providers/microsoft.operationalinsights/workspaces/<WorkspaceName>`. |
106+
| Workspace resource ID | Enter the full resource ID of the workspace where traffic analytics has to be enabled. The format of workspace resource ID is: `/subscriptions/<SubscriptionID>/resourcegroups/<ResourceGroupName>/providers/microsoft.operationalinsights/workspaces/<WorkspaceName>`. |
107107
| Workspace region | Select the region of your traffic analytics workspace. |
108108
| Workspace ID | Enter your traffic analytics workspace ID. |
109109
| Network Watcher resource group | Select the resource group of your Network Watcher. |
@@ -147,7 +147,7 @@ Remediation task fails with `PolicyAuthorizationFailed` error code: sample error
147147

148148
In such scenario, the managed identity must be manually granted access. Go to the appropriate subscription/resource group (containing the resources provided in the policy parameters) and grant contributor access to the managed identity created by the policy.
149149

150-
## Next steps
150+
## Related content
151151

152152
- Learn about [NSG flow logs built-in policies](./nsg-flow-logs-policy-portal.md).
153153
- Learn more about [traffic analytics](./traffic-analytics.md).

0 commit comments

Comments
 (0)