Skip to content

Commit 9d57679

Browse files
committed
Audit reviewer feedback
1 parent fff83f3 commit 9d57679

File tree

2 files changed

+23
-23
lines changed

2 files changed

+23
-23
lines changed

articles/sql-database/create-auditing-storage-account-vnet-firewall.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -52,9 +52,9 @@ Connect to [Azure portal](https://portal.azure.com) with your subscription. Navi
5252
>
5353
>If you do not see this message, then storage account is not behind a VNet.
5454
55-
3. Select the number of days for the retention period. Then click **OK**. Logs older than the retention period are deleted.
55+
4. Select the number of days for the retention period. Then click **OK**. Logs older than the retention period are deleted.
5656

57-
4. Select **Save** on your auditing settings.
57+
5. Select **Save** on your auditing settings.
5858

5959
You have successfully configured audit to write to a storage account behind a VNet or firewall.
6060

@@ -74,38 +74,38 @@ The sample scripts in this section require you to update the script before you r
7474

7575
To configure SQL Audit to write events to a storage account behind a VNet or Firewall:
7676

77-
1. Register your Azure SQL Database server with Azure Active Directory (AAD):
78-
79-
- In PowerShell
77+
1. Register your Azure SQL Database server with Azure Active Directory (AAD). Use either PowerShell or REST API.
8078

79+
**PowerShell**
80+
8181
```powershell
8282
Connect-AzAccount
8383
Select-AzSubscription -SubscriptionId <subscriptionId>
8484
Set-AzSqlServer -ResourceGroupName <your resource group> -ServerName <sql database server> -AssignIdentity
8585
```
8686

87-
- In [REST API](https://docs.microsoft.com/rest/api/sql/servers/createorupdate):
87+
[**REST API**](https://docs.microsoft.com/rest/api/sql/servers/createorupdate):
8888

89-
Sample Request
89+
Sample request
9090

9191
```html
9292
PUT https://management.azure.com/subscriptions/<subscription ID>/resourceGroups/<resource group>/providers/Microsoft.Sql/servers/<sql database server>?api-version=2015-05-01-preview
9393
```
9494

95-
Request Body
95+
Request body
9696

9797
```json
9898
{
99-
"identity": {
100-
"type": "SystemAssigned",
101-
},
102-
"properties": {
103-
"fullyQualifiedDomainName": "<sql database server>.database.windows.net",
104-
"administratorLogin": "<administrator login>",
105-
"administratorLoginPassword": "<complex password>",
106-
"version": "12.0",
107-
"state": "Ready"
108-
}
99+
"identity": {
100+
"type": "SystemAssigned",
101+
},
102+
"properties": {
103+
"fullyQualifiedDomainName": "<sql database server>.database.windows.net",
104+
"administratorLogin": "<administrator login>",
105+
"administratorLoginPassword": "<complex password>",
106+
"version": "12.0",
107+
"state": "Ready"
108+
}
109109
```
110110

111111
2. Open [Azure portal](https://portal.azure.com). Navigate to your storage account. Locate **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL database that you registered with Azure Active Directory (AAD) as in the previous step.
@@ -115,13 +115,13 @@ To configure SQL Audit to write events to a storage account behind a VNet or Fir
115115

116116
3. Configure [Azure SQL server's blob auditing policy](/rest/api/sql/server%20auditing%20settings/createorupdate), without specifying a *storageAccountAccessKey*:
117117

118-
Sample Request
118+
Sample request
119119

120120
```html
121121
PUT https://management.azure.com/subscriptions/<subscription ID>/resourceGroups/<resource group>/providers/Microsoft.Sql/servers/<azure sql database server>?api-version=2017-03-01-preview
122122
```
123123

124-
Request Body
124+
Request body
125125

126126
```json
127127
{
@@ -135,5 +135,5 @@ To configure SQL Audit to write events to a storage account behind a VNet or Fir
135135
## Next steps
136136

137137
- [Use PowerShell to create a virtual network service endpoint, and then a virtual network rule for Azure SQL Database.](sql-database-vnet-service-endpoint-rule-powershell.md)
138-
- [Virtual Network Rules: Operations](/api/sql/virtualnetworkrules) with REST APIs
138+
- [Virtual Network Rules: Operations with REST APIs](/rest/api/sql/virtualnetworkrules)
139139
- [Use virtual network service endpoints and rules for database servers](sql-database-vnet-service-endpoint-rule-overview.md)

articles/sql-database/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,9 +119,9 @@
119119
items:
120120
- name: Azure SQL Auditing
121121
href: sql-database-auditing.md
122-
- name: Audit to storage account
122+
- name: To storage behind VNet or firewall
123123
href: create-auditing-storage-account-vnet-firewall.md
124-
- name: Audit Log Format
124+
- name: Audit log format
125125
href: sql-database-audit-log-format.md
126126

127127
- name: Security management

0 commit comments

Comments
 (0)