Skip to content

Commit aa97e23

Browse files
committed
fix links and correct one more article
1 parent 3f91e39 commit aa97e23

File tree

3 files changed

+32
-32
lines changed

3 files changed

+32
-32
lines changed

articles/azure-monitor/platform/diagnostic-logs-schema.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,12 +44,12 @@ The schema for resource diagnostic logs varies depending on the resource and log
4444
| --- | --- |
4545
| Azure Active Directory | [Overview](../../active-directory/reports-monitoring/concept-activity-logs-azure-monitor.md), [Audit log schema](../../active-directory/reports-monitoring/reference-azure-monitor-audit-log-schema.md) and [Sign-ins schema](../../active-directory/reports-monitoring/reference-azure-monitor-sign-ins-log-schema.md) |
4646
| Analysis Services | https://azure.microsoft.com/blog/azure-analysis-services-integration-with-azure-diagnostic-logs/ |
47-
| API Management | [API Management Resource Logs](../../api-management/api-management-howto-use-azure-monitor.md#diagnostic-logs) |
47+
| API Management | [API Management Resource Logs](../../api-management/api-management-howto-use-azure-monitor.md#resource-logs) |
4848
| Application Gateways |[Logging for Application Gateway](../../application-gateway/application-gateway-diagnostics.md) |
4949
| Azure Automation |[Log analytics for Azure Automation](../../automation/automation-manage-send-joblogs-log-analytics.md) |
5050
| Azure Batch |[Azure Batch logging](../../batch/batch-diagnostics.md) |
51-
| Azure Database for MySQL | [Azure Database for MySQL diagnostic logs](../../mysql/concepts-server-logs.md#diagnostic-logs) |
52-
| Azure Database for PostgreSQL | [Azure Database for PostgreSQL logs](../../postgresql/concepts-server-logs.md#diagnostic-logs) |
51+
| Azure Database for MySQL | [Azure Database for MySQL diagnostic logs](../../mysql/concepts-server-logs.md#resource-logs) |
52+
| Azure Database for PostgreSQL | [Azure Database for PostgreSQL logs](../../postgresql/concepts-server-logs.md#resource-logs) |
5353
| Azure Data Explorer | [Azure Data Explorer logs](/azure/data-explorer/using-diagnostic-logs) |
5454
| Cognitive Services | [Logging for Azure Cognitive Services](../../cognitive-services/diagnostic-logging.md) |
5555
| Container Registry | [Logging for Azure Container Registry](../../container-registry/container-registry-diagnostics-audit-logs.md) |

articles/azure-signalr/signalr-tutorial-diagnostic-logs.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,38 @@
11
---
2-
title: Diagnostic Logs for Azure SignalR Service
3-
description: Learn how to set up diagnostic logs for Azure SignalR Service and how to utilize it to self-troubleshoot.
2+
title: Resource Logs for Azure SignalR Service
3+
description: Learn how to set up resource logs for Azure SignalR Service and how to utilize it to self-troubleshoot.
44
author: wanlwanl
55
ms.service: signalr
66
ms.topic: conceptual
77
ms.date: 12/17/2019
88
ms.author: wanl
99
---
1010

11-
# Diagnostic Logs for Azure SignalR Service
11+
# Resource logs for Azure SignalR Service
1212

13-
This tutorial covers what are diagnostic logs for Azure SignalR Service and how to set up diagnostic logs and how to troubleshoot with diagnostic logs.
13+
This tutorial discusses what resource logs for Azure SignalR Service are, how to set them up, and how to troubleshoot with them.
1414

1515
## Prerequisites
16-
To enable diagnostic logs, you'll need somewhere to store your log data. This tutorial uses Azure Storage and Log Analytics.
16+
To enable resource logs, you'll need somewhere to store your log data. This tutorial uses Azure Storage and Log Analytics.
1717

18-
* [Azure storage](../azure-monitor/platform/resource-logs-collect-storage.md) - Retains diagnostic logs for policy audit, static analysis, or backup.
18+
* [Azure storage](../azure-monitor/platform/resource-logs-collect-storage.md) - Retains resource logs for policy audit, static analysis, or backup.
1919
* [Log Analytics](../azure-monitor/platform/resource-logs-collect-workspace.md) - A flexible log search and analytics tool that allows for analysis of raw logs generated by an Azure resource.
2020

21-
## Set up diagnostic logs for an Azure SignalR Service
21+
## Set up resource logs for an Azure SignalR Service
2222

23-
You can view diagnostic logs for Azure SignalR Service. These logs provide richer view of connectivity to your Azure SignalR Service instance. The diagnostic logs provide detailed information of every connection. For example, basic information (user ID, connection ID and transport type and so on) and event information (connect, disconnect and abort event and so on) of the connection. Diagnostic logs can be used for issue identification, connection tracking and analysis.
23+
You can view resource logs for Azure SignalR Service. These logs provide richer view of connectivity to your Azure SignalR Service instance. The resource logs provide detailed information of every connection. For example, basic information (user ID, connection ID and transport type and so on) and event information (connect, disconnect and abort event and so on) of the connection. resource logs can be used for issue identification, connection tracking and analysis.
2424

25-
### Enable diagnostic logs
25+
### Enable resource logs
2626

27-
Diagnostic logs are disabled by default. To enable diagnostic logs, follow these steps:
27+
Resource logs are disabled by default. To enable resource logs, follow these steps:
2828

2929
1. In the [Azure portal](https://portal.azure.com), under **Monitoring**, click **Diagnostic settings**.
3030

3131
![Pane navigation to diagnostic settings](./media/signalr-tutorial-diagnostic-logs/diagnostic-settings-menu-item.png)
3232

3333
1. Then click **Add diagnostic setting**.
3434

35-
![Add diagnostic logs](./media/signalr-tutorial-diagnostic-logs/add-diagnostic-setting.png)
35+
![Add resource logs](./media/signalr-tutorial-diagnostic-logs/add-diagnostic-setting.png)
3636

3737
1. Set the archive target that you want. Currently, we support **Archive to a storage account** and **Send to Log Analytics**.
3838

@@ -45,17 +45,17 @@ Diagnostic logs are disabled by default. To enable diagnostic logs, follow these
4545

4646
New settings take effect in about 10 minutes. After that, logs appear in the configured archival target, in the **Diagnostics logs** pane.
4747

48-
For more information about configuring diagnostics, see the [overview of Azure diagnostic logs](../azure-monitor/platform/platform-logs-overview.md).
48+
For more information about configuring diagnostics, see the [overview of Azure resource logs](../azure-monitor/platform/platform-logs-overview.md).
4949

50-
### Diagnostic logs categories
50+
### Resource logs categories
5151

52-
Azure SignalR Service captures diagnostic logs in one category:
52+
Azure SignalR Service captures resource logs in one category:
5353

5454
* **All Logs**: Track connections that connect to Azure SignalR Service. The logs provide information about the connect/disconnect, authentication and throttling. For more information, see the next section.
5555

5656
### Archive to a storage account
5757

58-
Logs are stored in the storage account that configured in **Diagnostics logs** pane. A container named `insights-logs-alllogs` is created automatically to store diagnostic logs. Inside the container, logs are stored in the file `resourceId=/SUBSCRIPTIONS/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/RESOURCEGROUPS/XXXX/PROVIDERS/MICROSOFT.SIGNALRSERVICE/SIGNALR/XXX/y=YYYY/m=MM/d=DD/h=HH/m=00/PT1H.json`. Basically, the path is combined by `resource ID` and `Date Time`. The log files are split by `hour`. Therefore, the minutes always be `m=00`.
58+
Logs are stored in the storage account that configured in **Diagnostics logs** pane. A container named `insights-logs-alllogs` is created automatically to store resource logs. Inside the container, logs are stored in the file `resourceId=/SUBSCRIPTIONS/XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX/RESOURCEGROUPS/XXXX/PROVIDERS/MICROSOFT.SIGNALRSERVICE/SIGNALR/XXX/y=YYYY/m=MM/d=DD/h=HH/m=00/PT1H.json`. Basically, the path is combined by `resource ID` and `Date Time`. The log files are split by `hour`. Therefore, the minutes always be `m=00`.
5959

6060
All logs are stored in JavaScript Object Notation (JSON) format. Each entry has string fields that use the format described in the following sections.
6161

@@ -111,13 +111,13 @@ The following code is an example of an archive log JSON string:
111111

112112
### Archive logs schema for Log Analytics
113113

114-
To view diagnostic logs, follow these steps:
114+
To view resource logs, follow these steps:
115115

116116
1. Click `Logs` in your target Log Analytics.
117117

118118
![Log Analytics menu item](./media/signalr-tutorial-diagnostic-logs/log-analytics-menu-item.png)
119119

120-
2. Enter `SignalRServiceDiagnosticLogs` and select time range to query diagnostic logs. For advanced query, see [Get started with Log Analytics in Azure Monitor](../azure-monitor/log-query/get-started-portal.md)
120+
2. Enter `SignalRServiceDiagnosticLogs` and select time range to query resource logs. For advanced query, see [Get started with Log Analytics in Azure Monitor](../azure-monitor/log-query/get-started-portal.md)
121121

122122
![Query log in Log Analytics](./media/signalr-tutorial-diagnostic-logs/query-log-in-log-analytics.png)
123123

@@ -137,11 +137,11 @@ ConnectionId | Identity of the connection
137137
ConnectionType | Type of the connection. Allowed values are: `Server` \| `Client`. `Server`: connection from server side; `Client`: connection from client side
138138
TransportType | Transport type of the connection. Allowed values are: `Websockets` \| `ServerSentEvents` \| `LongPolling`
139139

140-
### Troubleshooting with diagnostic logs
140+
### Troubleshooting with resource logs
141141

142-
To troubleshoot for Azure SignalR Service, you can enable server/client side logs to capture failures. At present, Azure SignalR Service exposes diagnostic logs, you can also enable logs for service side.
142+
To troubleshoot for Azure SignalR Service, you can enable server/client side logs to capture failures. At present, Azure SignalR Service exposes resource logs, you can also enable logs for service side.
143143

144-
When encountering connection unexpected growing or dropping situation, you can take advantage of diagnostic logs to troubleshoot.
144+
When encountering connection unexpected growing or dropping situation, you can take advantage of resource logs to troubleshoot.
145145

146146
Typical issues are often about connections' unexpected quantity changes, connections reach connection limits and authorization failure. See the next sections about how to troubleshoot.
147147

@@ -151,7 +151,7 @@ Typical issues are often about connections' unexpected quantity changes, connect
151151

152152
If you encounter unexpected connections drop, firstly enable logs in service, server and client sides.
153153

154-
If a connection disconnects, the diagnostic logs will record this disconnecting event, you will see `ConnectionAborted` or `ConnectionEnded` in `operationName`.
154+
If a connection disconnects, the resource logs will record this disconnecting event, you will see `ConnectionAborted` or `ConnectionEnded` in `operationName`.
155155

156156
The difference between `ConnectionAborted` and `ConnectionEnded` is that `ConnectionEnded` is an expected disconnecting which is triggered by client or server side. While the `ConnectionAborted` is usually an unexpected connection dropping event, and aborting reason will be provided in `message`.
157157

@@ -168,20 +168,20 @@ Server connection dropped | Server connection drops with unknown error, consider
168168

169169
##### Unexpected connection growing
170170

171-
To troubleshoot about unexpected connection growing, the first thing you need to do is to filter out the extra connections. You can add unique test user ID to your test client connection. Then verify it in with diagnostic logs, if you see more than one client connections have the same test user ID or IP, then it is likely the client side create and establish more connections than expectation. Check your client side.
171+
To troubleshoot about unexpected connection growing, the first thing you need to do is to filter out the extra connections. You can add unique test user ID to your test client connection. Then verify it in with resource logs, if you see more than one client connections have the same test user ID or IP, then it is likely the client side create and establish more connections than expectation. Check your client side.
172172

173173
#### Authorization failure
174174

175-
If you get 401 Unauthorized returned for client requests, check your diagnostic logs. If you encounter `Failed to validate audience. Expected Audiences: <valid audience>. Actual Audiences: <actual audience>`, it means all audiences in your access token are invalid. Try to use the valid audiences suggested in the log.
175+
If you get 401 Unauthorized returned for client requests, check your resource logs. If you encounter `Failed to validate audience. Expected Audiences: <valid audience>. Actual Audiences: <actual audience>`, it means all audiences in your access token are invalid. Try to use the valid audiences suggested in the log.
176176

177177

178178
#### Throttling
179179

180-
If you find that you cannot establish SignalR client connections to Azure SignalR Service, check your diagnostic logs. If you encounter `Connection count reaches limit` in diagnostic log, you establish too many connections to SignalR Service, which reach the connection count limit. Consider scaling up your SignalR Service. If you encounter `Message count reaches limit` in diagnostic log, it means you use free tier, and you use up the quota of messages. If you want to send more messages, consider changing your SignalR Service to standard tier to send additional messages. For more information, see [Azure SignalR Service Pricing](https://azure.microsoft.com/pricing/details/signalr-service/).
180+
If you find that you cannot establish SignalR client connections to Azure SignalR Service, check your resource logs. If you encounter `Connection count reaches limit` in resource log, you establish too many connections to SignalR Service, which reach the connection count limit. Consider scaling up your SignalR Service. If you encounter `Message count reaches limit` in resource log, it means you use free tier, and you use up the quota of messages. If you want to send more messages, consider changing your SignalR Service to standard tier to send additional messages. For more information, see [Azure SignalR Service Pricing](https://azure.microsoft.com/pricing/details/signalr-service/).
181181

182182
### Get help
183183

184-
We recommend you troubleshoot by yourself first. Most issues are caused by app server or network issues. Follow [troubleshooting guide with diagnostic log](#troubleshooting-with-diagnostic-logs) and [basic trouble shooting guide](https://github.com/Azure/azure-signalr/blob/dev/docs/tsg.md) to find the root cause.
184+
We recommend you troubleshoot by yourself first. Most issues are caused by app server or network issues. Follow [troubleshooting guide with resource log](#troubleshooting-with-diagnostic-logs) and [basic trouble shooting guide](https://github.com/Azure/azure-signalr/blob/dev/docs/tsg.md) to find the root cause.
185185
If the issue still can't be resolved, then consider open an issue in GitHub or create ticket in Azure Portal.
186186
Provide:
187187
1. Time range about 30 minutes when the issue occurs

articles/bastion/diagnostic-logs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Enable and work with Azure Bastion diagnostic logs'
2+
title: 'Enable and work with Azure Bastion resource logs'
33
description: In this article, learn how to enable and work with Azure Bastion diagnostic logs.
44
services: bastion
55
author: charwen
@@ -11,11 +11,11 @@ ms.author: charwen
1111

1212
---
1313

14-
# Enable and work with Bastion diagnostic logs
14+
# Enable and work with Bastion resource logs
1515

1616
As users connect to workloads using Azure Bastion, Bastion can log diagnostics of the remote sessions. You can then use the diagnostics to view which users connected to which workloads, at what time, from where, and other such relevant logging information. In order to use the diagnostics, you must enable diagnostics logs on Azure Bastion. This article helps you enable diagnostics logs, and then view the logs.
1717

18-
## <a name="enable"></a>Enable the diagnostics log
18+
## <a name="enable"></a>Enable the resource log
1919

2020
1. In the [Azure portal](https://portal.azure.com), navigate to your Azure Bastion resource and select **Diagnostics settings** from the Azure Bastion page.
2121

@@ -40,7 +40,7 @@ To access your diagnostics logs, you can directly use the storage account that y
4040
2. As you navigate to inside the container, you see various folders in your blog. These folders indicate the resource hierarchy for your Azure Bastion resource.
4141

4242
![add diagnostic setting](./media/diagnostic-logs/2-resource-h.png)
43-
3. Navigate to the full hierarchy of your Azure Bastion resource whose diagnostics logs you wish to access/view. The 'y=', 'm=', 'd=', 'h=' and 'm=' indicate the year, month, day, hour, and minute respectively for the diagnostic logs.
43+
3. Navigate to the full hierarchy of your Azure Bastion resource whose diagnostics logs you wish to access/view. The 'y=', 'm=', 'd=', 'h=' and 'm=' indicate the year, month, day, hour, and minute respectively for the resource logs.
4444

4545
![select storage location](./media/diagnostic-logs/3-resource-location.png)
4646
4. Locate the json file created by Azure Bastion that contains the diagnostics log data for the time-period navigated to.

0 commit comments

Comments
 (0)