Skip to content

Commit bbfd790

Browse files
committed
Fixing errors
1 parent 62f3e69 commit bbfd790

File tree

3 files changed

+14
-14
lines changed

3 files changed

+14
-14
lines changed

articles/sentinel/connect-google-cloud-platform.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -32,16 +32,16 @@ Before you begin, verify that you have:
3232

3333
- The Microsoft Sentinel solution enabled.
3434
- A defined Microsoft Sentinel workspace.
35-
- A GCP environment collecting GCP Audit Logs.
35+
- A GCP environment collecting GCP audit logs.
3636
- The Microsoft Sentinel Contributor role.
3737
- Access to edit and create resources in the GCP project.
3838

39-
### Set up GCP environment
39+
## Set up GCP environment
4040

4141
You can set up the GCP environment in one of two ways:
4242

4343
- [Create GCP resources via the Terraform API](#create-gcp-resources-via-the-terraform-api): Terraform provides an API for the Identity and Access Management (IAM) that creates the resources: The topic, a subscription for the topic, a workload identity pool, a workload identity provider, a service account, and a role.
44-
- [Set up GCP environment manually](#) via the GCP console
44+
- [Set up GCP environment manually](#) via the GCP console.
4545

4646
### Create GCP resources via the Terraform API
4747

@@ -65,8 +65,8 @@ You can set up the GCP environment in one of two ways:
6565
```
6666
6767
1. Type your Microsoft tenant ID. Learn how to [find your tenant ID](../active-directory/fundamentals/active-directory-how-to-find-tenant.md).
68-
1. When asked if a workload Identity Pool has already been created for Azure, type **yes** or **no**.
69-
1. When asked if you want to create the resources listed, type **yes**.
68+
1. When asked if a workload Identity Pool has already been created for Azure, type *yes* or *no*.
69+
1. When asked if you want to create the resources listed, type *yes*.
7070
1. Save the resources parameters for later use.
7171
1. In a new folder, copy the Terraform `GCPAuditLogsSetup` script into a new file, and save it as a .tf file:
7272
@@ -91,7 +91,7 @@ You can set up the GCP environment in one of two ways:
9191
terraform apply -var="organization-id= {organizationId} "
9292
```
9393
94-
1. Type **yes**.
94+
1. Type *yes*.
9595
9696
1. Save the resource parameters for later use.
9797
@@ -119,11 +119,11 @@ TBD - screenshot
119119
| take 10
120120
```
121121
122-
1. Enable the [health feature](enable-monitoring) for data connectors.
122+
1. Enable the [health feature](enable-monitoring.md) for data connectors.
123123
124124
### Set up the GCP environment manually via the GCP portal
125125
126-
Alternatively, you can set up the environment [via the Terraform API](#create-gcp-resources-via-the-terraform-api).
126+
This section shows you how to manually set up the GCP environment. Alternatively, you can set up the environment [via the Terraform API](#create-gcp-resources-via-the-terraform-api). If you already set up the environment via the API, skip this section.
127127
128128
#### Create the role
129129
@@ -133,7 +133,7 @@ Alternatively, you can set up the environment [via the Terraform API](#create-gc
133133
1. Filter the permissions by the **Pub/Sub Subscriber** and **Pub/Sub Viewer** roles, and select **pubsub.subscriptions.consume** and **pubsub.subscriptions.get** permissions.
134134
1. To confirm, select **ADD**.
135135
136-
:::image type="content" source="media/connect-google-cloud-platform/gcp-create-role.png" alt-text="Screenshot of adding permissions when adding a GCP role.":::
136+
:::image type="content" source="media/connect-google-cloud-platform/gcp-create-role.png" alt-text="Screenshot of adding permissions when adding a GCP role." lightbox="media/connect-google-cloud-platform/gcp-create-role.png":::
137137
138138
1. To create the role, select **Create**.
139139
@@ -198,17 +198,17 @@ Alternatively, you can set up the environment [via the Terraform API](#create-gc
198198
1. If needed, filter the logs by selecting specific logs to include. Otherwise, all logs are sent.
199199
1. Select **Create sink**.
200200
201-
> [!NOTE]
202-
> To ingest logs for the entire organization:
203-
> 1. Select the organization under **Project**.
204-
> 1. Repeat steps 2-4, and under **Choose logs to include in the sink** in the **Log Router** section, select **Include logs ingested by this organization and all child resources**.
201+
> [!NOTE]
202+
> To ingest logs for the entire organization:
203+
> 1. Select the organization under **Project**.
204+
> 1. Repeat steps 2-4, and under **Choose logs to include in the sink** in the **Log Router** section, select **Include logs ingested by this organization and all child resources**.
205205
206206
TBD - screenshot
207207
208208
#### Verify that GCP can receive incoming messages
209209
210210
1. In the GCP console, navigate to **Subscriptions**.
211-
1. Select **Messages**, and select **PULL** button to initiate a manual pull.
211+
1. Select **Messages**, and select **PULL** to initiate a manual pull.
212212
1. Check the incoming messages.
213213
214214
## Next steps
Binary file not shown.
172 KB
Loading

0 commit comments

Comments
 (0)