Skip to content

Commit 66e68b2

Browse files
committed
updated draft
1 parent d6ad27c commit 66e68b2

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

articles/openshift/howto-enable-nsg-flowlogs.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@ keywords: azure, openshift, aro, red hat, azure CLI
1616

1717
Flow logs allow you to analyze traffic for Network Security Groups in specific regions that have Azure Network Watcher configured.
1818

19-
2019
## Prerequisites
2120

2221
You must have an existing Azure Red Hat OpenShift cluster. Follow this guide to [create a private Azure Red Hat OpenShift cluster](howto-create-private-cluster-4x.md).
@@ -34,8 +33,7 @@ Create a storage account for storing the actual flow logs. It must be in the sam
3433

3534
## Configure service principal
3635

37-
The service principal used by the cluster needs the [proper permissions](../network-watcher/required-rbac-permissions) in order to create necessary resources for the flow logs and to access the storage account.
38-
The easiest way to achieve that is by assigning it the network administrator and storage account contributor role on subscription level. Alternatively, you can create a custom role containing the required actions from the page linked above and assign it to the service principal.
36+
The service principal used by the cluster needs the [proper permissions](../network-watcher/required-rbac-permissions.md) in order to create necessary resources for the flow logs and to access the storage account. The easiest way to achieve that is by assigning it the network administrator and storage account contributor role on subscription level. Alternatively, you can create a custom role containing the required actions from the page linked above and assign it to the service principal.
3937

4038
To get the service principal ID, run the following command:
4139
```
@@ -53,7 +51,7 @@ To assign storage account contributor, run the following command:
5351
```
5452
az role assignment create --role "17d1049b-9a84-46fb-8f53-869881c3d3ab" --assignee-object-id "{servicePrincipalObjectID}"
5553
```
56-
See [this page](../role-based-access-control/built-in-roles) for IDs of built-in roles.
54+
See [Azure built-in roles](../role-based-access-control/built-in-roles.md) for IDs of built-in roles.
5755

5856
Create a spec as in the following example, or update the existing spec to contain `spec.nsgFlowLogs` in case you are already using another preview feature:
5957
```
@@ -72,6 +70,6 @@ spec:
7270
storageAccountResourceId: "subscriptions/{subscriptionID}/resourceGroups/{resourceGroupName}/providers/Microsoft.Storage/storageAccounts/{storageAccountName}"
7371
version: {version}
7472
```
75-
See [this page](../network-watcher/network-watcher-nsg-flow-logging-portal) for possible values for `version` and `retentionDays`.
73+
See [Tutorial: Log network traffic to and from a virtual machine using the Azure portal](../network-watcher/network-watcher-nsg-flow-logging-portal.md) for possible values for `version` and `retentionDays`.
7674

7775
The cluster will create flow logs for each Network Security Group in the cluster resource group.

0 commit comments

Comments
 (0)