Skip to content

Commit 734debd

Browse files
committed
Fixed Errors
4/22/2019
1 parent 5c31af6 commit 734debd

File tree

5 files changed

+32
-33
lines changed

5 files changed

+32
-33
lines changed

articles/vpn-gateway/TOC.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,11 +180,11 @@
180180
href: vpn-gateway-3rdparty-device-config-overview.md
181181
- name: 'Sample: Cisco ASA device (IKEv2/no BGP)'
182182
href: vpn-gateway-3rdparty-device-config-cisco-asa.md
183-
- name: Monitoring & Alerting
183+
- name: Monitoring and alerts
184184
items:
185-
- name: Setup alerts based on metrics
185+
- name: Set up alerts based on metrics
186186
href: vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric.md
187-
- name: Setup alerts based on diagnostic log
187+
- name: Set up alerts based on diagnostic log
188188
href: vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log.md
189189
- name: Troubleshoot
190190
href: vpn-gateway-troubleshoot.md
-1.13 KB
Loading
-1.23 KB
Loading

articles/vpn-gateway/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: 'How to setup alerts on VPN Gateway diagnostic log events'
2+
title: 'How to set up alerts on Azure VPN Gateway diagnostic log events'
33
description: Steps to configure alerts on VPN Gateway diagnostic log events
44
services: vpn-gateway
55
author: anzaman
66

77
ms.service: vpn-gateway
88
ms.topic: conceptional
9-
ms.date: 04/16/2019
10-
ms.author: anzaman
9+
ms.date: 04/22/2019
10+
ms.author: alzam
1111

1212
---
1313
# Setting up alerts on VPN Gateway diagnostic log events
@@ -19,49 +19,49 @@ This article helps you set up alerts based on VPN Gateway diagnostic log events.
1919

2020
The example steps below will create an alert for a site-to-site VPN tunnel disconnection event
2121

22-
### 1. Search for "Log Analytics" under All services and pick "Log Analytics workspaces"
2322

24-
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert0.png "Create")
2523

26-
### <a name="cmdlets"></a>2. Click "Create" in the Log Analytics page.
24+
1. Search for "Log Analytics" under All services and pick "Log Analytics workspaces"
25+
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert0.png "Create")
2726

27+
2. Click "Create" in the Log Analytics page.
2828
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert1.png "Select")
2929

30-
### <a name="cmdlets"></a>3. Check "Create New" workspace and fill in the details.
30+
3. Check "Create New" workspace and fill in the details.
3131
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert2.png "Select")
3232

33-
### <a name="cmdlets"></a>4. Find your VPN gateway under the "Monitor" > "Diagnostics settings" blade
33+
4. Find your VPN gateway under the "Monitor" > "Diagnostics settings" blade
3434
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert3.png "Select")
3535

36-
### <a name="cmdlets"></a>5. To turn on diagnostics, double-click on the gateway and then click on "Turn on diagnostics"
36+
5. To turn on diagnostics, double-click on the gateway and then click on "Turn on diagnostics"
3737
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert4.png "Select")
3838

39-
### <a name="cmdlets"></a>6. Fill in the details and ensure that "Send to Log Analytics" and "TunnelDiagnosticLog" are checked. Pick the Log Analytics Worksspace that was created in step 3.
39+
6. Fill in the details and ensure that "Send to Log Analytics" and "TunnelDiagnosticLog" are checked. Pick the Log Analytics Workspace that was created in step 3.
4040
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert5.png "Select")
4141

42-
### <a name="cmdlets"></a>7. Navigate to the virtual network gateway resource overview and select "Alerts" from the Monitoring tab, then create a new alert rule or edit an existing alert rule.
42+
7. Navigate to the virtual network gateway resource overview and select "Alerts" from the Monitoring tab, then create a new alert rule or edit an existing alert rule.
4343
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert6.png "Select")
4444

45-
### <a name="cmdlets"></a>8. Select the Log Analytics workspace and the resource.
45+
8. Select the Log Analytics workspace and the resource.
4646
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert7.png "Select")
4747

48-
### <a name="cmdlets"></a>9. Select "Custom log search" as the signal logic under "Add condition"
48+
9. Select "Custom log search" as the signal logic under "Add condition"
4949
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert8.png "Select")
5050

51-
### <a name="cmdlets"></a>10. Enter the following query in the "Search query" text box replacing the values in <> as appropriate.
51+
10. Enter the following query in the "Search query" text box replacing the values in <> as appropriate.
5252

5353
AzureDiagnostics |
5454
where Category == "TunnelDiagnosticLog" and ResourceId == toupper("<RESOURCEID OF GATEWAY>") and TimeGenerated > ago(5m) and
5555
remoteIP_s == "<REMOTE IP OF TUNNEL>" and status_s == "Disconnected"
5656

57-
###Set the threshold value to 0 and click "Done"
57+
Set the threshold value to 0 and click "Done"
5858

59-
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert9.png "Select")
59+
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert9.png "Select")
6060

61-
### <a name="cmdlets"></a>11. On the "Create rule" page, click "Create New" under the ACTION GROUPS section. Fill in the details and click OK
61+
11. On the "Create rule" page, click "Create New" under the ACTION GROUPS section. Fill in the details and click OK
6262
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert10.png "Select")
6363

64-
### <a name="cmdlets"></a>12. On the "Create rule" page, fill in the details for "Customize Action" and make sure that the correct Action group name appears in the "Action Group Name" section. Click "Create alert rule" to create the rule.
64+
12. On the "Create rule" page, fill in the details for "Customize Action" and make sure that the correct Action group name appears in the "Action Group Name" section. Click "Create alert rule" to create the rule.
6565
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-log/log-alert11.png "Select")
6666

6767
## Next steps

articles/vpn-gateway/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: 'How to setup alerts on VPN Gateway metrics'
2+
title: 'How to set up alerts on Azure VPN Gateway metrics'
33
description: Steps to configure alerts on VPN Gateway metrics
44
services: vpn-gateway
55
author: anzaman
66

77
ms.service: vpn-gateway
88
ms.topic: conceptional
9-
ms.date: 04/15/2019
10-
ms.author: anzaman
9+
ms.date: 04/22/2019
10+
ms.author: alzam
1111

1212
---
1313
# Setting up alerts on VPN Gateway metrics
@@ -40,26 +40,25 @@ The example steps below will create an alert on a gateway for: <br>
4040

4141

4242

43-
### 1. Navigate to the virtual network gateway resource and select "Alerts" from the Monitoring tab, then create a new alert rule or edit an existing alert rule.
43+
1. Navigate to the virtual network gateway resource and select "Alerts" from the Monitoring tab, then create a new alert rule or edit an existing alert rule.
4444

4545
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric/metric-alert1.png "Create")
4646

47-
### <a name="cmdlets"></a>2. Select your VPN gateway as the resource.
47+
2. Select your VPN gateway as the resource.
4848

4949
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric/metric-alert2.png "Select")
5050

51-
### <a name="cmdlets"></a>3. Select a metric to configure for the alert
51+
3. Select a metric to configure for the alert
5252
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric/metric-alert3.png "Select")
53+
4. Configure the signal logic. There are three components to signal logic:
5354

54-
### <a name="cmdlets"></a>4. Configure the signal logic. There are three components to signal logic:
55-
56-
a. Dimensions: If the metric has dimensions, specific dimension values can be selected so that the alert only evaluates data of that dimension. These are optional.<br>
57-
b. Condition: The operation to evaluate the metric value.<br>
58-
c. Time: Specify the granularity of metric data, and the period of time to evaluate the alert on.<br>
55+
a. Dimensions: If the metric has dimensions, specific dimension values can be selected so that the alert only evaluates data of that dimension. These are optional.<br>
56+
b. Condition: The operation to evaluate the metric value.<br>
57+
c. Time: Specify the granularity of metric data, and the period of time to evaluate the alert on.<br>
5958

6059
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric/metric-alert4.png "Select")
6160

62-
### <a name="cmdlets"></a>4. To view the configured rules, click on "Manage alert rules"
61+
5. To view the configured rules, click on "Manage alert rules"
6362
![point-to-site](./media/vpn-gateway-howto-setup-alerts-for-virtual-network-gateway-metric/metric-alert8.png "Select")
6463

6564
## Next steps

0 commit comments

Comments
 (0)