You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-logstash-data-connection-rules.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -392,7 +392,7 @@ After you retrieve the required values:
392
392
393
393
|Field |Description |Default value |
394
394
|---------|---------|---------|
395
-
|`azure_cloud`|Used to specify the name of the Azure cloud that is being used, 'AzureCloud' is set as default. Available values are: 'AzureCloud', 'AzureChinaCloud' and 'AzureUSGovernment'. |None (field is empty)|
395
+
|`azure_cloud`|Used to specify the name of the Azure cloud that is being used, Available values are: `AzureCloud`, `AzureChinaCloud`, and `AzureUSGovernment`. |`AzureCloud`|
396
396
|`key_names`|An array of strings. Provide this field if you want to send a subset of the columns to Log Analytics. |None (field is empty) |
397
397
|`plugin_flush_interval`|Defines the maximal time difference (in seconds) between sending two messages to Log Analytics. |`5`|
398
398
|`retransmission_time`|Sets the amount of time in seconds for retransmitting messages once sending failed. |`10`|
@@ -446,16 +446,18 @@ To monitor the connectivity and activity of the Microsoft Sentinel output plugin
446
446
If you are not seeing any data in this log file, generate and send some events locally (through the input and filter plugins) to make sure the output plugin is receiving data. Microsoft Sentinel will support only issues relating to the output plugin.
447
447
448
448
449
-
####Network security
449
+
### Network security
450
450
Define network settings and enable network isolation for Microsoft Sentinel Logstash output plugin.
451
451
452
-
#####Virtual network service tags
452
+
#### Virtual network service tags
453
453
454
454
Microsoft Sentinel output plugin supports [Azure virtual network service tags](../virtual-network/service-tags-overview.md). Both *AzureMonitor* and *AzureActiveDirectory* tags are required.
455
455
456
456
Azure Virtual network service tags can be used to define network access controls on [network security groups](../virtual-network/network-security-groups-overview.md#security-rules), [Azure Firewall](../firewall/service-tags.md), and user-defined routes. Use service tags in place of specific IP addresses when you create security rules and routes. For scenarios where Azure virtual network service tags cannot be used, the Firewall requirements are given below.
457
457
458
-
##### Firewall requirements
458
+
#### Firewall requirements
459
+
460
+
The following table lists the firewall requirements for scenarios where Azure virtual network service tags can't be used.
0 commit comments