You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-insights/ingestion-agent-configuration-reference.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -153,9 +153,10 @@ source:
153
153
# The path to a folder on the SFTP server that files will be uploaded to Azure Operator Insights from.
154
154
base_path: /path/to/sftp/folder
155
155
# Optional. A regular expression to specify which files in the base_path folder should be ingested. If not specified, the agent will attempt to ingest all files in the base_path folder (subject to exclude_pattern, settling_time and exclude_before_time).
156
-
include_pattern: "*\.csv$"
156
+
include_pattern: ".*\.csv$"
157
157
# Optional. A regular expression to specify any files in the base_path folder which should not be ingested. Takes priority over include_pattern, so files which match both regular expressions will not be ingested.
158
-
exclude_pattern: '\.backup$'
158
+
# The exclude_pattern can also be used to ignore whole directories, but the pattern must still match all files under that directory. e.g. `^excluded-dir/.*$` or `^excluded-dir/` but *not* `^excluded-dir$`
159
+
exclude_pattern: "\.backup$|^\.staging/"
159
160
# A duration, such as "10s", "5m", "1h".. During an upload run, any files last modified within the settling time are not selected for upload, as they may still be being modified.
160
161
settling_time: 1m
161
162
# Optional. A datetime that adheres to the RFC 3339 format. Any files last modified before this datetime will be ignored.
Copy file name to clipboardExpand all lines: articles/operator-insights/monitor-troubleshoot-ingestion-agent.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,8 @@ Metrics are reported in a simple human-friendly form.
32
32
33
33
To collect a diagnostics package, SSH to the Virtual Machine and run the command `/usr/bin/microsoft/az-aoi-ingestion-gather-diags`. This command generates a date-stamped zip file in the current directory that you can copy from the system.
34
34
35
+
If you have configued collection of logs through the Azure Monitor agent, you can view ingestion agent logs in the portal view of your Log Analytics workspace, and may not need to collect a diagnostics package to debug your issues.
36
+
35
37
> [!NOTE]
36
38
> Microsoft Support might request diagnostics packages when investigating an issue. Diagnostics packages don't contain any customer data or the value of any credentials.
37
39
@@ -118,6 +120,7 @@ Symptoms: No data appears in Azure Data Explorer. Logs of category `Ingestion` d
118
120
- Check that the agent is running on all VMs and isn't reporting errors in logs.
119
121
- Check that files exist in the correct location on the SFTP server, and that they aren't being excluded due to file source config (see [Files are missing](#files-are-missing)).
120
122
- Check the network connectivity and firewall configuration between the ingestion agent VM and the Data Product's input storage account.
123
+
- Ensure that the configured SFTP user can read all directories under the `base_path` which aren't being excluded by file source config.
Copy file name to clipboardExpand all lines: articles/operator-insights/set-up-ingestion-agent.md
+13-4Lines changed: 13 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,6 +139,9 @@ On the SFTP server:
139
139
140
140
1. Ensure port 22/TCP to the VM is open.
141
141
1. Create a new user, or determine an existing user on the SFTP server that the ingestion agent should use to connect to the SFTP server.
142
+
- The ingestion agent searches every directory under the base path which is not excluded. Ensure this user has read permission on all files in the directories which are not excluded.
143
+
> [!Note]
144
+
> Implicitly excluding directories by not specifying them in the included pattern is not sufficient to stop the agent searching those directories. See [the configuration reference](ingestion-agent-configuration-reference.md) for more detail on excluding directories.
142
145
1. Determine the authentication method that the ingestion agent should use to connect to the SFTP server. The agent supports:
143
146
- Password authentication
144
147
- SSH key authentication
@@ -277,7 +280,12 @@ The configuration you need is specific to the type of source and your Data Produ
277
280
- `user`: the name of the user on the SFTP server that the agent should use to connect.
278
281
- Depending on the method of authentication you chose in [Prepare the VMs](#prepare-the-vms), set either `password` or `private_key`.
279
282
- For password authentication, set `secret_name` to the name of the file containing the password in the `secrets_directory` folder.
280
-
- For SSH key authentication, set `key_secret` to the name of the file containing the SSH key in the `secrets_directory` folder. If the private key is protected with a passphrase, set `passphrase_secret_name` to the name of the file containing the passphrase in the `secrets_directory` folder.
283
+
- For SSH key authentication, set `key_secret_name` to the name of the file containing the SSH key in the `secrets_directory` folder. If the private key is protected with a passphrase, set `passphrase_secret_name` to the name of the file containing the passphrase in the `secrets_directory` folder.
284
+
- All secret files should have permissions of `600` (`rw-------`), and an owner of `az-aoi-ingestion` so only the ingestion agent and privileged users can read them.
285
+
```
286
+
sudo chmod 600 <secrets_directory>/*
287
+
sudo chown az-aoi-ingestion <secrets_directory>/*
288
+
```
281
289
282
290
For required or recommended values for other fields, refer to the documentation for your Data Product.
283
291
@@ -327,11 +335,12 @@ If you're running the ingestion agent on an Azure VM or on an on-premises VM con
327
335
To collect ingestion agent logs, follow [the Azure Monitor documentation to install the Azure Monitor Agent and configure log collection](../azure-monitor/agents/data-collection-text-log.md).
328
336
329
337
- These docs use the Az PowerShell module to create a logs table. Follow the [Az PowerShell module install documentation](/powershell/azure/install-azure-powershell) first.
330
-
- The `YourOptionalColumn` section from the sample `$tableParams` JSON is unnecessary for the ingestion agent, and can be removed.
338
+
- The `YourOptionalColumn` section from the sample `$tableParams` JSON is unnecessary for the ingestion agent, and can be removed.
331
339
- When adding a data source to your data collection rule, add a `Custom Text Logs` source type, with file pattern `/var/log/az-aoi-ingestion/stdout.log`.
332
-
- After adding the data collection rule, you can query these logs through the Log Analytics workspace. Use the following query to make them easier to work with:
340
+
- We also recommend following [the documentation to add a `Linux Syslog` Data source](../azure-monitor/agents/data-collection-syslog.md) to your data collection rule, to allow for auditing of all processes running on the VM.
341
+
- After adding the data collection rule, you can query the ingestion agent logs through the Log Analytics workspace. Use the following query to make them easier to work with:
333
342
```
334
-
RawAgentLogs_CL
343
+
<CustomTableName>_CL
335
344
| extend RawData = replace_regex(RawData, '\\x1b\\[\\d{1,4}m', '') // Remove any color tags
336
345
| parse RawData with TimeGenerated: datetime ' ' Level ' ' Message // Parse the log lines into the TimeGenerated, Level and Message columns for easy filtering
0 commit comments