Skip to content

Commit 6c92e20

Browse files
Merge pull request #265023 from rboucher/patch-42
Update diagnostic-settings for clarity
2 parents 6d37ac0 + 76e720f commit 6c92e20

File tree

1 file changed

+10
-16
lines changed

1 file changed

+10
-16
lines changed

articles/azure-monitor/essentials/diagnostic-settings.md

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,7 @@ ms.reviewer: lualderm
1212

1313
# Diagnostic settings in Azure Monitor
1414

15-
This article provides details on creating and configuring diagnostic settings to send Azure platform metrics and logs to different destinations.
16-
17-
[Platform metrics](./metrics-supported.md) are sent automatically to [Azure Monitor Metrics](./data-platform-metrics.md) by default and without configuration.
18-
19-
[Platform logs](./platform-logs-overview.md) provide detailed diagnostic and auditing information for Azure resources and the Azure platform they depend on.
20-
21-
- **Resource logs** aren't collected until they're routed to a destination.
22-
- **Activity logs** exist on their own but can be routed to other locations.
15+
This article provides details on creating and configuring diagnostic settings to send Azure platform metrics, resource logs and the activity log to different destinations.
2316

2417
Each Azure resource requires its own diagnostic setting, which defines the following criteria:
2518

@@ -46,24 +39,24 @@ Information on these newer features is included in this article.
4639

4740
There are three sources for diagnostic information:
4841

49-
- Metrics
50-
- Resource logs
51-
- Activity logs
42+
- **[Platform metrics](./metrics-supported.md)** are sent automatically to [Azure Monitor Metrics](./data-platform-metrics.md) by default and without configuration.
43+
- **[Platform logs](./platform-logs-overview.md)** - provide detailed diagnostic and auditing information for Azure resources and the Azure platform they depend on.
44+
- **Resource logs** aren't collected until they're routed to a destination.
45+
- The **Activity log** provides information about resources from outside the resource, such as when the resource was created or deleted. Entries exist on their own but can be routed to other locations.
5246

5347
### Metrics
5448

5549
The **AllMetrics** setting routes a resource's platform metrics to other destinations. This option might not be present for all resource providers.
5650

5751
### Resource logs
5852

59-
With logs, you can select the log categories you want to route individually or choose a category group.
53+
With resource logs, you can select the log categories you want to route individually or choose a category group.
6054

55+
**Category groups**
6156
> [!NOTE]
6257
> Category groups don't apply to all metric resource providers. If a provider doesn't have them available in the diagnostic settings in the Azure portal, then they also won't be available via Azure Resource Manager templates.
6358
64-
You can use *category groups* to dynamically collect resource logs based on predefined groupings instead of selecting individual log categories. Microsoft defines the groupings to help monitor specific use cases across all Azure services.
65-
66-
Over time, the categories in the group might be updated as new logs are rolled out or as assessments change. When log categories are added or removed from a category group, your log collection is modified automatically without you having to update your diagnostic settings.
59+
You can use *category groups* to dynamically collect resource logs based on predefined groupings instead of selecting individual log categories. Microsoft defines the groupings to help monitor specific use cases across all Azure services. Over time, the categories in the group might be updated as new logs are rolled out or as assessments change. When log categories are added or removed from a category group, your log collection is modified automatically without you having to update your diagnostic settings.
6760

6861
When you use category groups, you:
6962

@@ -105,6 +98,7 @@ To ensure the security of data in transit, all destination endpoints are configu
10598

10699
The activity log uses a diagnostic setting but has its own user interface because it applies to the whole subscription rather than individual resources. The destination information listed here still applies. For more information, see [Azure activity log](activity-log.md).
107100

101+
108102
## Requirements and limitations
109103

110104
This section discusses requirements and limitations.
@@ -136,7 +130,7 @@ The following table provides unique requirements for each destination including
136130
| Destination | Requirements |
137131
|:---|:---|
138132
| Log Analytics workspace | The workspace doesn't need to be in the same region as the resource being monitored.|
139-
| Storage account | Don't use an existing storage account that has other, nonmonitoring data stored in it so that you can better control access to the data. If you're archiving the activity log and resource logs together, you might choose to use the same storage account to keep all monitoring data in a central location.<br><br>To send the data to immutable storage, set the immutable policy for the storage account as described in [Set and manage immutability policies for Azure Blob Storage](../../storage/blobs/immutable-policy-configure-version-scope.md). You must follow all steps in this linked article including enabling protected append blobs writes.<br><br>The storage account needs to be in the same region as the resource being monitored if the resource is regional.<br><br> Diagnostic settings can't access storage accounts when virtual networks are enabled. You must enable **Allow trusted Microsoft services** to bypass this firewall setting in storage accounts so that the Azure Monitor diagnostic settings service is granted access to your storage account.<br><br>[Azure DNS zone endpoints (preview)](../../storage/common/storage-account-overview.md#azure-dns-zone-endpoints-preview) and [Azure Premium LRS](../../storage/common/storage-redundancy.md#locally-redundant-storage) (locally redundant storage) storage accounts aren't supported as a log or metric destination.|
133+
| Storage account | Don't use an existing storage account that has other, non-monitoring data stored in it. Spliting the types of data up allow you better control access to the data. If you're archiving the activity log and resource logs together, you might choose to use the same storage account to keep all monitoring data in a central location.<br><br>To prevent modification of the data, send it to immutable storage. Set the immutable policy for the storage account as described in [Set and manage immutability policies for Azure Blob Storage](../../storage/blobs/immutable-policy-configure-version-scope.md). You must follow all steps in this linked article including enabling protected append blobs writes.<br><br>The storage account needs to be in the same region as the resource being monitored if the resource is regional.<br><br> Diagnostic settings can't access storage accounts when virtual networks are enabled. You must enable **Allow trusted Microsoft services** to bypass this firewall setting in storage accounts so that the Azure Monitor diagnostic settings service is granted access to your storage account.<br><br>[Azure DNS zone endpoints (preview)](../../storage/common/storage-account-overview.md#azure-dns-zone-endpoints-preview) and [Azure Premium LRS](../../storage/common/storage-redundancy.md#locally-redundant-storage) (locally redundant storage) storage accounts aren't supported as a log or metric destination.|
140134
| Event Hubs | The shared access policy for the namespace defines the permissions that the streaming mechanism has. Streaming to Event Hubs requires Manage, Send, and Listen permissions. To update the diagnostic setting to include streaming, you must have the ListKey permission on that Event Hubs authorization rule.<br><br>The event hub namespace needs to be in the same region as the resource being monitored if the resource is regional. <br><br> Diagnostic settings can't access Event Hubs resources when virtual networks are enabled. You must enable **Allow trusted Microsoft services** to bypass this firewall setting in Event Hubs so that the Azure Monitor diagnostic settings service is granted access to your Event Hubs resources.|
141135
| Partner integrations | The solutions vary by partner. Check the [Azure Monitor partner integrations documentation](../../partner-solutions/overview.md) for details.
142136

0 commit comments

Comments
 (0)