Skip to content

Commit bc3bb1e

Browse files
committed
Azure Monitor activity log export links
1 parent ce4df52 commit bc3bb1e

File tree

4 files changed

+59
-59
lines changed

4 files changed

+59
-59
lines changed

articles/azure-monitor/platform/data-sources.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,8 @@ The [Azure Activity log](platform-logs-overview.md) includes service health reco
6969
|:---|:---|
7070
| Activity log | The Activity log is collected into its own data store that you can view from the Azure Monitor menu or use to create Activity log alerts. | [Query the Activity log in the Azure portal](activity-log-view.md#azure-portal) |
7171
| Azure Monitor Logs | Configure Azure Monitor Logs to collect the Activity log to analyze it with other monitoring data. | [Collect and analyze Azure activity logs in Log Analytics workspace in Azure Monitor](activity-log-collect.md) |
72-
| Azure Storage | Export the Activity log to Azure Storage for archiving. | [Archive Activity log](activity-log-export.md#archive-activity-log) |
73-
| Event Hubs | Stream the Activity log to other locations using Event Hubs | [Stream Activity log to Event Hub](activity-log-export.md#stream-activity-log-to-event-hub). |
72+
| Azure Storage | Export the Activity log to Azure Storage for archiving. | [Archive Activity log](resource-logs-collect-storage.md) |
73+
| Event Hubs | Stream the Activity log to other locations using Event Hubs | [Stream Activity log to Event Hub](resource-logs-stream-event-hubs.md). |
7474

7575
### Azure Service Health
7676
[Azure Service Health](../../service-health/service-health-overview.md) provides information about the health of the Azure services in your subscription that your application and resources rely on.
@@ -98,7 +98,7 @@ Most Azure services will send [platform metrics](data-platform-metrics.md) that
9898
### Resource logs
9999
[Resource logs](platform-logs-overview.md) provide insights into the _internal_ operation of an Azure resource. Resource logs are created automatically, but you must create a diagnostic setting to specify a destination for them to collected for each resource.
100100

101-
The configuration requirements and content of resource logs vary by resource type, and not all services yet create them. See [Supported services, schemas, and categories for Azure resource logs](diagnostic-logs-schema.md) for details on each service and links to detailed configuration procedures. If the service isnt listed in this article, then that service doesnt currently create resource logs.
101+
The configuration requirements and content of resource logs vary by resource type, and not all services yet create them. See [Supported services, schemas, and categories for Azure resource logs](diagnostic-logs-schema.md) for details on each service and links to detailed configuration procedures. If the service isn't listed in this article, then that service doesn't currently create resource logs.
102102

103103
| Destination | Description | Reference |
104104
|:---|:---|:---|

articles/azure-monitor/platform/diagnostic-settings-legacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Collect Azure Activity log with diagnostic settings (preview) - Azure Monitor | Microsoft Docs
2+
title: Collect Azure Activity log with diagnostic settings - Azure Monitor | Microsoft Docs
33
description: Use diagnostic settings to forward Azure Activity logs to Azure Monitor Logs, Azure storage, or Azure Event Hubs.
44
author: bwren
55
ms.service: azure-monitor

articles/azure-monitor/platform/resource-logs-blob-format.md

Lines changed: 54 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.subservice: logs
1212
# Prepare for format change to Azure Monitor platform logs archived to a storage account
1313

1414
> [!WARNING]
15-
> If you are sending [Azure resource logs or metrics to a storage account using diagnostic settings](resource-logs-collect-storage.md) or [activity logs to a storage account using log profiles](activity-log-export.md), the format of the data in the storage account changed to JSON Lines on Nov. 1, 2018. The instructions below describe the impact and how to update your tooling to handle the new format.
15+
> If you are sending [Azure resource logs or metrics to a storage account using diagnostic settings](resource-logs-collect-storage.md) or [activity logs to a storage account using log profiles](resource-logs-collect-storage.md), the format of the data in the storage account changed to JSON Lines on Nov. 1, 2018. The instructions below describe the impact and how to update your tooling to handle the new format.
1616
>
1717
1818
## What changed
@@ -54,60 +54,60 @@ The current format of the PT1H.json file in Azure blob storage uses a JSON array
5454

5555
```json
5656
{
57-
"records": [
58-
{
59-
"time": "2016-01-05T01:32:01.2691226Z",
60-
"resourceId": "/SUBSCRIPTIONS/361DA5D4-A47A-4C79-AFDD-XXXXXXXXXXXX/RESOURCEGROUPS/CONTOSOGROUP/PROVIDERS/MICROSOFT.KEYVAULT/VAULTS/CONTOSOKEYVAULT",
61-
"operationName": "VaultGet",
62-
"operationVersion": "2015-06-01",
63-
"category": "AuditEvent",
64-
"resultType": "Success",
65-
"resultSignature": "OK",
66-
"resultDescription": "",
67-
"durationMs": "78",
68-
"callerIpAddress": "104.40.82.76",
69-
"correlationId": "",
70-
"identity": {
71-
"claim": {
72-
"http://schemas.microsoft.com/identity/claims/objectidentifier": "d9da5048-2737-4770-bd64-XXXXXXXXXXXX",
73-
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn": "live.com#[email protected]",
74-
"appid": "1950a258-227b-4e31-a9cf-XXXXXXXXXXXX"
75-
}
76-
},
77-
"properties": {
78-
"clientInfo": "azure-resource-manager/2.0",
79-
"requestUri": "https://control-prod-wus.vaultcore.azure.net/subscriptions/361da5d4-a47a-4c79-afdd-XXXXXXXXXXXX/resourcegroups/contosoresourcegroup/providers/Microsoft.KeyVault/vaults/contosokeyvault?api-version=2015-06-01",
80-
"id": "https://contosokeyvault.vault.azure.net/",
81-
"httpStatusCode": 200
82-
}
83-
},
57+
"records": [
8458
{
85-
"time": "2016-01-05T01:33:56.5264523Z",
86-
"resourceId": "/SUBSCRIPTIONS/361DA5D4-A47A-4C79-AFDD-XXXXXXXXXXXX/RESOURCEGROUPS/CONTOSOGROUP/PROVIDERS/MICROSOFT.KEYVAULT/VAULTS/CONTOSOKEYVAULT",
87-
"operationName": "VaultGet",
88-
"operationVersion": "2015-06-01",
89-
"category": "AuditEvent",
90-
"resultType": "Success",
91-
"resultSignature": "OK",
92-
"resultDescription": "",
93-
"durationMs": "83",
94-
"callerIpAddress": "104.40.82.76",
95-
"correlationId": "",
96-
"identity": {
97-
"claim": {
98-
"http://schemas.microsoft.com/identity/claims/objectidentifier": "d9da5048-2737-4770-bd64-XXXXXXXXXXXX",
99-
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn": "live.com#[email protected]",
100-
"appid": "1950a258-227b-4e31-a9cf-XXXXXXXXXXXX"
101-
}
102-
},
103-
"properties": {
104-
"clientInfo": "azure-resource-manager/2.0",
105-
"requestUri": "https://control-prod-wus.vaultcore.azure.net/subscriptions/361da5d4-a47a-4c79-afdd-XXXXXXXXXXXX/resourcegroups/contosoresourcegroup/providers/Microsoft.KeyVault/vaults/contosokeyvault?api-version=2015-06-01",
106-
"id": "https://contosokeyvault.vault.azure.net/",
107-
"httpStatusCode": 200
108-
}
109-
}
110-
]
59+
"time": "2016-01-05T01:32:01.2691226Z",
60+
"resourceId": "/SUBSCRIPTIONS/361DA5D4-A47A-4C79-AFDD-XXXXXXXXXXXX/RESOURCEGROUPS/CONTOSOGROUP/PROVIDERS/MICROSOFT.KEYVAULT/VAULTS/CONTOSOKEYVAULT",
61+
"operationName": "VaultGet",
62+
"operationVersion": "2015-06-01",
63+
"category": "AuditEvent",
64+
"resultType": "Success",
65+
"resultSignature": "OK",
66+
"resultDescription": "",
67+
"durationMs": "78",
68+
"callerIpAddress": "104.40.82.76",
69+
"correlationId": "",
70+
"identity": {
71+
"claim": {
72+
"http://schemas.microsoft.com/identity/claims/objectidentifier": "d9da5048-2737-4770-bd64-XXXXXXXXXXXX",
73+
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn": "live.com#[email protected]",
74+
"appid": "1950a258-227b-4e31-a9cf-XXXXXXXXXXXX"
75+
}
76+
},
77+
"properties": {
78+
"clientInfo": "azure-resource-manager/2.0",
79+
"requestUri": "https://control-prod-wus.vaultcore.azure.net/subscriptions/361da5d4-a47a-4c79-afdd-XXXXXXXXXXXX/resourcegroups/contosoresourcegroup/providers/Microsoft.KeyVault/vaults/contosokeyvault?api-version=2015-06-01",
80+
"id": "https://contosokeyvault.vault.azure.net/",
81+
"httpStatusCode": 200
82+
}
83+
},
84+
{
85+
"time": "2016-01-05T01:33:56.5264523Z",
86+
"resourceId": "/SUBSCRIPTIONS/361DA5D4-A47A-4C79-AFDD-XXXXXXXXXXXX/RESOURCEGROUPS/CONTOSOGROUP/PROVIDERS/MICROSOFT.KEYVAULT/VAULTS/CONTOSOKEYVAULT",
87+
"operationName": "VaultGet",
88+
"operationVersion": "2015-06-01",
89+
"category": "AuditEvent",
90+
"resultType": "Success",
91+
"resultSignature": "OK",
92+
"resultDescription": "",
93+
"durationMs": "83",
94+
"callerIpAddress": "104.40.82.76",
95+
"correlationId": "",
96+
"identity": {
97+
"claim": {
98+
"http://schemas.microsoft.com/identity/claims/objectidentifier": "d9da5048-2737-4770-bd64-XXXXXXXXXXXX",
99+
"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn": "live.com#[email protected]",
100+
"appid": "1950a258-227b-4e31-a9cf-XXXXXXXXXXXX"
101+
}
102+
},
103+
"properties": {
104+
"clientInfo": "azure-resource-manager/2.0",
105+
"requestUri": "https://control-prod-wus.vaultcore.azure.net/subscriptions/361da5d4-a47a-4c79-afdd-XXXXXXXXXXXX/resourcegroups/contosoresourcegroup/providers/Microsoft.KeyVault/vaults/contosokeyvault?api-version=2015-06-01",
106+
"id": "https://contosokeyvault.vault.azure.net/",
107+
"httpStatusCode": 200
108+
}
109+
}
110+
]
111111
}
112112
```
113113

articles/azure-monitor/platform/stream-monitoring-data-event-hubs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Before you configure streaming for any data source, you need to [create an Event
3030
| Tier | Data | Method |
3131
|:---|:---|:---|
3232
| [Azure tenant](data-sources.md#azure-tenant) | Azure Active Directory audit logs | Configure a tenant diagnostic setting on your AAD tenant. See [Tutorial: Stream Azure Active Directory logs to an Azure event hub](../../active-directory/reports-monitoring/tutorial-azure-monitor-stream-logs-to-event-hub.md) for details. |
33-
| [Azure subscription](data-sources.md#azure-subscription) | Azure Activity Log | Create a log profile to export Activity Log events to Event Hubs. See [Export Azure Activity log to storage or Azure Event Hubs](activity-log-export.md) for details. |
33+
| [Azure subscription](data-sources.md#azure-subscription) | Azure Activity Log | Create a log profile to export Activity Log events to Event Hubs. See [Stream Azure platform logs to Azure Event Hubs](resource-logs-stream-event-hubs.md) for details. |
3434
| [Azure resources](data-sources.md#azure-resources) | Platform metrics<br> Resource logs |Both types of data are sent to an event hub using a resource diagnostic setting. See [Stream Azure resource logs to an event hub](resource-logs-stream-event-hubs.md) for details. |
3535
| [Operating system (guest)](data-sources.md#operating-system-guest) | Azure virtual machines | Install the [Azure Diagnostics Extension](diagnostics-extension-overview.md) on Windows and Linux virtual machines in Azure. See [Streaming Azure Diagnostics data in the hot path by using Event Hubs](diagnostics-extension-stream-event-hubs.md) for details on Windows VMs and [Use Linux Diagnostic Extension to monitor metrics and logs](../../virtual-machines/extensions/diagnostics-linux.md#protected-settings) for details on Linux VMs. |
3636
| [Application code](data-sources.md#application-code) | Application Insights | Application Insights doesn't provide a direct method to stream data to event hubs. You can [set up continuous export](../../azure-monitor/app/export-telemetry.md) of the Application Insights data to a storage account and then use a Logic App to send the data to an event hub as described in [Manual streaming with Logic App](#manual-streaming-with-logic-app). |

0 commit comments

Comments
 (0)