You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-log.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,15 @@ ms.reviewer: yanivlavi
12
12
13
13
This article shows you how to create log alert rules and manage your alert instances. Azure Monitor log alerts allow users to use a [Log Analytics](../logs/log-analytics-tutorial.md) query to evaluate resource logs at a set frequency and fire an alert based on the results. Rules can trigger one or more actions using [alert processing rules](alerts-action-rules.md) and [action groups](./action-groups.md). Learn the concepts behind log alerts [here](alerts-types.md#log-alerts).
14
14
15
-
When an alert is triggered by an alert rule,
16
-
- Target: A specific Azure resource to monitor.
17
-
- Criteria: Logic to evaluate. If met, the alert fires.
18
-
- Action: Notifications or automation - email, SMS, webhook, and so on.
15
+
You create an alert rule by combining:
16
+
- The resource(s) to be monitored.
17
+
- The signal or telemetry from the resource
18
+
- Conditions
19
+
20
+
And then defining these elements of the triggered alert:
21
+
- Alert processing rules
22
+
- Action groups
23
+
19
24
You can also [create log alert rules using Azure Resource Manager templates](../alerts/alerts-log-create-templates.md).
20
25
## Create a new log alert rule in the Azure portal
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/basic-logs-configure.md
+26-3Lines changed: 26 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,6 +27,27 @@ You can currently configure the following tables for Basic Logs:
27
27
28
28
29
29
## Set table configuration
30
+
31
+
# [Portal](#tab/portal-1)
32
+
33
+
To configure a table for Basic Logs or Analytics Logs in the Azure portal:
34
+
35
+
1. From the **Log Analytics workspaces** menu, select **Tables (preview)**.
36
+
37
+
The **Tables (preview)** screen lists all of the tables in the workspace.
38
+
39
+
1. Select the context menu for the table you want to configure and select **Manage table**.
40
+
41
+
:::image type="content" source="media/basic-logs-configure/log-analytics-table-configuration.png" lightbox="media/basic-logs-configure/log-analytics-table-configuration.png" alt-text="Screenshot showing the Manage table button for one of the tables in a workspace.":::
42
+
43
+
1. From the **Table plan** dropdown on the table configuration screen, select **Basic** or **Analytics**.
44
+
45
+
The **Table plan** dropdown is enabled only for [tables that support Basic Logs](#which-tables-support-basic-logs).
46
+
47
+
:::image type="content" source="media/basic-logs-configure/log-analytics-configure-table-plan.png" lightbox="media/basic-logs-configure/log-analytics-configure-table-plan.png" alt-text="Screenshot showing the Table plan dropdown on the table configuration screen.":::
48
+
49
+
1. Select **Save**.
50
+
30
51
# [API](#tab/api-1)
31
52
32
53
To configure a table for Basic Logs or Analytics Logs, call the **Tables - Update** API:
@@ -117,9 +138,11 @@ For example:
117
138
---
118
139
119
140
## Check table configuration
120
-
# [Portal](#tab/portal-1)
141
+
# [Portal](#tab/portal-2)
142
+
143
+
To check table configuration in the Azure portal, you can open the table configuration screen, as described in [Set table configuration](#set-table-configuration).
121
144
122
-
To check the configuration of a table in the Azure portal:
145
+
Alternatively:
123
146
124
147
1. From the **Azure Monitor** menu, select **Logs** and select your workspace for the [scope](scope.md). See [Log Analytics tutorial](log-analytics-tutorial.md#view-table-information) for a walkthrough.
125
148
1. Open the **Tables** tab, which lists all tables in the workspace.
@@ -128,7 +151,7 @@ To check the configuration of a table in the Azure portal:
128
151
129
152

130
153
131
-
You can also hover over a table name for the table information view. This will specify that the table is configured as Basic Logs:
154
+
You can also hover over a table name for the table information view, which indicates whether the table is configured as Basic Logs:
132
155
133
156

Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/customer-managed-keys.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -254,10 +254,9 @@ When link your own storage (BYOS) to workspace, the service stores *saved-search
254
254
* You need to have "write" permissions on your workspace and Storage Account.
255
255
* Make sure to create your Storage Account in the same region as your Log Analytics workspace is located.
256
256
* The *saves searches* in storage is considered as service artifacts and their format may change.
257
-
* Existing *saves searches* are removed from your workspace. Copy and any *saves searches* that you need before the configuration. You can view your *saved-searches* using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch).
258
-
* Query history isn't supported and you won't be able to see queries that you ran.
257
+
* Existing *saves searches* are removed from your workspace. Copy any *saves searches* that you need before this configuration. You can view your *saved-searches* using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch).
258
+
* Query 'history' and 'pin to dashboard' aren't supported when linking Storage Account for queries.
259
259
* You can link a single Storage Account to a workspace, which can be used for both *saved-searches* and *log alerts* queries.
260
-
* Pin to dashboard isn't supported.
261
260
* Fired log alerts will not contains search results or alert query. You can use [alert dimensions](../alerts/alerts-unified-log.md#split-by-alert-dimensions) to get context in the fired alerts.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/data-retention-archive.md
+25-8Lines changed: 25 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ During the interactive retention period, data is available for monitoring, troub
23
23
> The archive feature is currently in public preview and can only be set at the table level, not at the workspace level.
24
24
25
25
## Configure the default workspace retention policy
26
-
You can set the workspace default retention policy in the Azure portal to 30, 31, 60, 90, 120, 180, 270, 365, 550, and 730 days. To set a different policy, use the Resource Manager configuration method described below. If you're on the *free* tier, you need to upgrade to the paid tier to change the data retention period.
26
+
You can set the workspace default retention policy in the Azure portal to 30, 31, 60, 90, 120, 180, 270, 365, 550, and 730 days. You can set a different policy for specific tables by [configuring retention and archive policy at the table level](#set-retention-and-archive-policy-by-table). If you're on the *free* tier, you'll need to upgrade to the paid tier to change the data retention period.
27
27
28
28
To set the default workspace retention policy:
29
29
@@ -37,17 +37,25 @@ To set the default workspace retention policy:
37
37
38
38
## Set retention and archive policy by table
39
39
40
-
You can set retention policies for individual tables, except for workspaces in the legacy Free Trial pricing tier, using Azure Resource Manager APIs. You can’t currently configure data retention for individual tablesin the Azure portal.
40
+
By default, all tables in your workspace inherit the workspace's interactive retention setting and have no archive policy. You can modify the retention and archive policies of individual tables, except for workspaces in the legacy Free Trial pricing tier.
41
41
42
42
You can keep data in interactive retention between 4 and 730 days. You can set the archive period for a total retention time of up to 2,555 days (seven years).
43
43
44
-
Each table is a subresource of the workspace it's in. For example, you can address the `SecurityEvent` table in [Azure Resource Manager](../../azure-resource-manager/management/overview.md) as:
To set the retention and archive duration for a table in the Azure portal:
47
+
48
+
1. From the **Log Analytics workspaces** menu, select **Tables (preview)**.
49
+
50
+
The **Tables (preview)** screen lists all of the tables in the workspace.
51
+
52
+
1. Select the context menu for the table you want to configure and select **Manage table**.
53
+
54
+
:::image type="content" source="media/basic-logs-configure/log-analytics-table-configuration.png" lightbox="media/basic-logs-configure/log-analytics-table-configuration.png" alt-text="Screenshot showing the Manage table button for one of the tables in a workspace.":::
49
55
50
-
The table name is case-sensitive.
56
+
1. Configure the retention and archive duration in **Data retention settings** section of the table configuration screen.
57
+
58
+
:::image type="content" source="media/data-retention-configure/log-analytics-configure-table-retention-archive.png" lightbox="media/data-retention-configure/log-analytics-configure-table-retention-archive.png" alt-text="Screenshot showing the data retention settings on the table configuration screen.":::
> You don't explicitly specify the archive duration in the API call. Instead, you set the total retention, which specifies the retention plus the archive duration.
69
+
> You don't explicitly specify the archive duration in the API call. Instead, you set the total retention, which is the sum of the interactive retention plus the archive duration.
62
70
63
71
64
72
You can use either PUT or PATCH, with the following difference:
To view the retention and archive duration for a table in the Azure portal, from the **Log Analytics workspaces** menu, select **Tables (preview)**.
147
+
148
+
The **Tables (preview)** screen shows the interactive retention and archive period for all of the tables in the workspace.
149
+
150
+
:::image type="content" source="media/data-retention-configure/log-analytics-view-table-retention-archive.png" lightbox="media/data-retention-configure/log-analytics-view-table-retention-archive.png" alt-text="Screenshot showing the Manage table button for one of the tables in a workspace.":::
151
+
152
+
136
153
# [API](#tab/api-2)
137
154
138
155
To get the retention policy of a particular table (in this example, `SecurityEvent`), call the **Tables - Get** API:
# CLI example: Add an application to an Azure Batch account
11
11
12
-
This script demonstrates how to add an application for use with an Azure Batch pool or task. To set up an application to add to your Batch account, package your executable, together with any dependencies, into a zip file.
12
+
This script demonstrates how to add an application for use with an Azure Batch pool or task. To set up an application to add to your Batch account, package your executable, together with any dependencies, into a zip file.
An application can reference multiple application executable packages of different versions. The executables and any dependencies need to be zipped up for the package. Once uploaded, the CLI attempts to activate the package so that it's ready for use.
Copy file name to clipboardExpand all lines: articles/batch/scripts/batch-cli-sample-create-account.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,36 +1,38 @@
1
1
---
2
2
title: Azure CLI Script Example - Create Batch account - Batch service | Microsoft Docs
3
-
description: Learn how to create a Batch account in Batch service mode with this Azure CLI script example. This also script shows how to query or update various properties of the account.
3
+
description: Learn how to create a Batch account in Batch service mode with this Azure CLI script example. This script also shows how to query or update various properties of the account.
# CLI example: Create a Batch account in Batch service mode
11
11
12
12
This script creates an Azure Batch account in Batch service mode and shows how to query or update various properties of the account. When you create a Batch account in the default Batch service mode, its compute nodes are assigned internally by the Batch
13
-
service. Allocated compute nodes are subject to a separate vCPU (core) quota and the account can be
14
-
authenticated either via shared key credentials or an Azure Active Directory token.
13
+
service. Allocated compute nodes are subject to a separate vCPU (core) quota and the account can be authenticated either via shared key credentials or an Azure Active Directory token.
0 commit comments