Skip to content

Commit c3210ac

Browse files
committed
fixing pre-review feedback
1 parent 3cddb0a commit c3210ac

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/redis/monitor-diagnostic-settings.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,10 @@ ms.devlang: azurecli
1414

1515
# Monitor Azure Managed Redis data using diagnostic settings
1616

17-
Diagnostic settings in Azure are used to collect resource logs. An Azure resource emits resource logs and provides rich, frequent data about the operation of that resource. These logs are captured per request and are also referred to as "data plane logs". See [diagnostic settings in Azure Monitor](/azure/azure-monitor/essentials/diagnostic-settings) for a recommended overview of the functionality in Azure. The content of these logs varies by resource type. In Azure Managed Redis, two options are available to log:
17+
Diagnostic settings in Azure are used to collect resource logs. An Azure resource emits resource logs and provides rich, frequent data about the operation of that resource. These logs are captured per request and are also referred to as _data plane logs_. See [diagnostic settings in Azure Monitor](/azure/azure-monitor/essentials/diagnostic-settings) for a recommended overview of the functionality in Azure. The content of these logs varies by resource type. In Azure Managed Redis, two options are available to log:
1818

1919
- **Cache Metrics** (that is "AllMetrics") used to [log metrics from Azure Monitor](/azure/azure-monitor/essentials/diagnostic-settings?tabs=portal)
20-
- **Connection Logs** logs connections to the cache for security and diagnostic purposes.
20+
- **Connection Logs** logs connections to the cache for security and diagnostic purposes.
2121

2222
## Cache Metrics
2323

@@ -36,27 +36,27 @@ Azure Managed Redis uses the [audit connection events](https://redis.io/docs/lat
3636
## Prerequisites/Limitations of Connection Logging
3737

3838
- When you use **OSS Cluster Policy**, logs are emitted from each data node. When you use **Enterprise Cluster Policy**, only the node being used as a proxy emits logs. Both versions still cover all connections to the cache. This is just an architectural difference.
39-
- Data loss (that is, missing a connection event) is rare, but possible. Data loss is typically caused by networking issues.
40-
- Disconnection logs aren't yet fully stable and events may be missed.
39+
- Data loss (that is, missing a connection event) is rare, but possible. Data loss is typically caused by networking issues.
40+
- Disconnection logs aren't yet fully stable and events can be missed.
4141
- Because connection logs on Azure Managed Redis are event-based, be careful of your retention policies. For instance, if retention is set to 10 days, and a connection event occurred 15 days ago, that connection might still exist, but the log for that connection isn't retained.
4242
- If using [active geo-replication](how-to-active-geo-replication.md), logging must be configured for each cache instance in the geo-replication group individually.
43-
- All diagnostic settings may take up to [90 minutes](/azure/azure-monitor/essentials/diagnostic-settings#time-before-telemetry-gets-to-destination) to start flowing to your selected destination.
44-
- Enabling connection logs may cause a small performance degradation to the Redis instance.
43+
- All diagnostic settings can take up to [90 minutes](/azure/azure-monitor/essentials/diagnostic-settings#time-before-telemetry-gets-to-destination) to start flowing to your selected destination.
44+
- Enabling connection logs might cause a small performance degradation to the Redis instance.
4545

4646
> [!NOTE]
47-
> It is always possible to use the [INFO](https://redis.io/commands/info/) or [CLIENT LIST](https://redis.io/commands/client-list/) commands to check who is connected to a cache instance on-demand.
47+
> It's always possible to use the [INFO](https://redis.io/commands/info/) or [CLIENT LIST](https://redis.io/commands/client-list/) commands to check who is connected to a cache instance on-demand.
4848
>
4949
5050
> [!IMPORTANT]
51-
> When selecting logs, you can chose either the specific _Category_ or _Category groups_, which are predefined groupings of logs across Azure services. When you use _Category groups_, [you can no longer configure the retention settings](/azure/azure-monitor/essentials/diagnostic-settings#resource-logs). If you need to determine retention duration for your connection logs, select the item in the _Categories_ section instead.
51+
> When selecting logs, you can choose either the specific _Category_ or _Category groups_, which are predefined groupings of logs across Azure services. When you use _Category groups_, [you can no longer configure the retention settings](/azure/azure-monitor/essentials/diagnostic-settings#resource-logs). If you need to determine retention duration for your connection logs, select the item in the _Categories_ section instead.
5252
>
5353
5454
## Log Destinations
5555

5656
You can turn on diagnostic settings for Azure Managed Redis instances and send resource logs to the following destinations:
5757

5858
- **Log Analytics workspace** - doesn't need to be in the same region as the resource being monitored.
59-
- **Storage account** - must be in the same region as the cache. [Premium storage accounts are not supported](/azure/azure-monitor/essentials/diagnostic-settings#destination-limitations) as a destination, however.
59+
- **Storage account** - must be in the same region as the cache. [Premium storage accounts aren't supported](/azure/azure-monitor/essentials/diagnostic-settings#destination-limitations) as a destination, however.
6060
- **Event hub** - diagnostic settings can't access event hub resources when virtual networks are enabled. Enable the **Allow trusted Microsoft services to bypass this firewall?** setting in event hubs to grant access to your event hub resources. The event hub must be in the same region as the cache.
6161
- **Partner Solution** - a list of potential partner logging solutions can be found [here](/azure/partner-solutions/partners)
6262

@@ -133,7 +133,7 @@ Use the `az monitor diagnostic-settings create` command to create a diagnostic s
133133
az monitor diagnostic-settings create
134134
--resource /subscriptions/{subscriptionID}/resourceGroups/{resourceGroupName}/providers/Microsoft.Cache/redisenterprise/{cacheName}/databases/default
135135
--name {logName}
136-
--logs '[{"category": "ConnectionEvents","enabled": true,"retentionPolicy": {"enabled": false,"days": 0}}]'
136+
--logs '[{"category": "ConnectionEvents","enabled": true,"retentionPolicy": {"enabled": false,"days`: 0}}]'
137137
--event-hub {eventHubName}
138138
--event-hub-rule /subscriptions/{subscriptionID}/resourceGroups/{resourceGroupName}/providers/microsoft.eventhub/namespaces/{eventHubNamespace}/authorizationrule/{ruleName}
139139
--storage-account /subscriptions/{subscriptionID}/resourceGroups/{resourceGroupName}/providers/Microsoft.Storage/storageAccounts/{storageAccountName}
@@ -161,7 +161,7 @@ These fields and properties appear in the `ConnectionEvents` log category. In **
161161
| `eventStatus` | `EventStatus` | Results of an authentication request as a status code (only applicable for authentication event). |
162162

163163
> [!NOTE]
164-
> If private link is used, only a IPv6 address will be logged (unless you are streaming the data to log analytics). You can convert the IPv6 address to the equivalent IPv4 address by looking at the last four bytes of data in the IPv6 address. For instance, in the private link IPv6 address "fd40:8913:31:6810:6c31:200:a01:104", the last four bytes in hexadecimal are "0a", "01", "01", and "04". (Note that leading zeros are omitted after each colon.) These correspond to "10", "1", "1", and "4" in decimal, giving us the IPv4 address "10.1.1.4".
164+
> If private link is used, only a IPv6 address is logged (unless you're streaming the data to log analytics). You can convert the IPv6 address to the equivalent IPv4 address by looking at the last four bytes of data in the IPv6 address. For instance, in the private link IPv6 address `fd40:8913:31:6810:6c31:200:a01:104` the last four bytes in hexadecimal are `0a`, `01`, `01`, and `04`. (Leading zeros are omitted after each colon.) These bytes correspond to `10`, `1`, `1`, and `4` in decimal, giving us the IPv4 address `10.1.1.4`.
165165
>
166166
167167
#### Sample storage account log

0 commit comments

Comments
 (0)