Skip to content

Commit 9bb53f9

Browse files
authored
Merge pull request #213804 from normesta/monitoring
Updating the monitoring article
2 parents d2203d6 + 3981c4e commit 9bb53f9

File tree

7 files changed

+151
-961
lines changed

7 files changed

+151
-961
lines changed

articles/storage/blobs/blob-storage-monitoring-scenarios.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ You can find the friendly name of that security principal by taking the value of
110110
111111
### Auditing data plane operations
112112

113-
Data plane operations are captured in [Azure resource logs for Storage](monitor-blob-storage.md#analyzing-logs). You can [configure Diagnostic setting](monitor-blob-storage.md#send-logs-to-azure-log-analytics) to export logs to Log Analytics workspace for a native query experience.
113+
Data plane operations are captured in [Azure resource logs for Storage](monitor-blob-storage.md#analyzing-logs). You can [configure Diagnostic setting](../../azure-monitor/platform/diagnostic-settings.md) to export logs to Log Analytics workspace for a native query experience.
114114

115115
Here's a Log Analytics query that retrieves the "when", "who", "what", and "how" information in a list of log entries.
116116

@@ -163,7 +163,7 @@ StorageBlobLogs
163163

164164
For security reasons, SAS tokens don't appear in logs. However, the SHA-256 hash of the SAS token will appear in the `AuthenticationHash` field that is returned by this query.
165165

166-
If you've distributed several SAS tokens, and you want to know which SAS tokens are being used, you'll have to convert each of your SAS tokens to a SHA-256 hash, and then compare that hash to the hash value that appears in logs.
166+
If you've distributed several SAS tokens, and you want to know which SAS tokens are being used, you'll have to convert each of your SAS tokens to an SHA-256 hash, and then compare that hash to the hash value that appears in logs.
167167

168168
First decode each SAS token string. The following example decodes a SAS token string by using PowerShell.
169169

@@ -183,7 +183,7 @@ You can export logs to Log Analytics for rich native query capabilities. When yo
183183

184184
With Azure Synapse, you can create server-less SQL pool to query log data when you need. This could save costs significantly.
185185

186-
1. Export logs to storage account. For more information, see [Creating a diagnostic setting](monitor-blob-storage.md#creating-a-diagnostic-setting).
186+
1. Export logs to storage account. For more information, see [Creating a diagnostic setting](../../azure-monitor/platform/diagnostic-settings.md).
187187

188188
2. Create and configure a Synapse workspace. For more information, see [Quickstart: Create a Synapse workspace](../../synapse-analytics/quickstart-create-workspace.md).
189189

articles/storage/blobs/monitor-blob-storage.md

Lines changed: 40 additions & 242 deletions
Large diffs are not rendered by default.

articles/storage/common/sas-expiration-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ The SAS expiration period appears in the console output.
113113

114114
## Query logs for policy violations
115115

116-
To log the creation of a SAS that is valid over a longer interval than the SAS expiration policy recommends, first create a diagnostic setting that sends logs to an Azure Log Analytics workspace. For more information, see [Send logs to Azure Log Analytics](../blobs/monitor-blob-storage.md#send-logs-to-azure-log-analytics).
116+
To log the creation of a SAS that is valid over a longer interval than the SAS expiration policy recommends, first create a diagnostic setting that sends logs to an Azure Log Analytics workspace. For more information, see [Send logs to Azure Log Analytics](../../azure-monitor/platform/diagnostic-settings.md).
117117

118118
Next, use an Azure Monitor log query to monitor whether policy has been violated. Create a new query in your Log Analytics workspace, add the following query text, and press **Run**.
119119

@@ -147,7 +147,7 @@ Follow these steps to assign the built-in policy to the appropriate scope in the
147147

148148
To monitor your storage accounts for compliance with the key expiration policy, follow these steps:
149149

150-
1. On the Azure Policy dashboard, locate the built-in policy definition for the scope that you specified in the policy assignment. You can search for *Storage accounts should have shared access signature (SAS) policies configured* in the **Search** box to filter for the built-in policy.
150+
1. On the Azure Policy dashboard, locate the built-in policy definition for the scope that you specified in the policy assignment. You can search for `Storage accounts should have shared access signature (SAS) policies configured` in the **Search** box to filter for the built-in policy.
151151
1. Select the policy name with the desired scope.
152152
1. On the **Policy assignment** page for the built-in policy, select **View compliance**. Any storage accounts in the specified subscription and resource group that do not meet the policy requirements appear in the compliance report.
153153

0 commit comments

Comments
 (0)