You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Permissions to create Data Collection Rule objects](../essentials/data-collection-rule-overview.md#permissions) in the workspace.
22
-
- A VM, Virtual Machine Scale Set, or Arc-enabled on-premises server with IIS logs.
23
-
24
-
- The log file must be stored on a local drive of the machine on which Azure Monitor Agent is running.
22
+
- A VM, Virtual Machine Scale Set, or Arc-enabled on-premises server that runs IIS.
23
+
- An IIS log file in W3C format must be stored on the local drive of the machine on which Azure Monitor Agent is running.
25
24
- Each entry in the log file must be delineated with an end of line.
26
-
- The log file must not allow circular logging, log rotation where the file is overwritten with new entries or renaming where a file is moved and a new file with the same name is opened.
25
+
- The log file must not allow circular logging, log rotation where the file is overwritten with new entries, or renaming where a file is moved and a new file with the same name is opened.
26
+
27
27
## Create data collection rule to collect IIS logs
28
28
The [data collection rule](../essentials/data-collection-rule-overview.md) defines:
29
29
@@ -102,7 +102,7 @@ Heartbeat
102
102
### Verify that IIS logs are being created
103
103
Look at the timestamps of the log files and open the latest to see that latest timestamps are present in the log files. The default location for IIS log files is C:\\inetpub\\LogFiles\\W3SVC1.
104
104
105
-
:::image type="content" source="media/data-collection-text-log/iis-log-timestamp.png" lightbox="media/data-collection-text-log/iis-log-timestamp.png" alt-text="Screenshot of IIS log on agent machine showing the timestamp.":::
105
+
:::image type="content" source="media/data-collection-text-log/iis-log-timestamp.png" lightbox="media/data-collection-text-log/iis-log-timestamp.png" alt-text="Screenshot of an IIS log, showing the timestamp.":::
106
106
107
107
### Verify that you specified the correct log location in the data collection rule
108
108
The data collection rule will have a section similar to the following. The `logDirectories` element specifies the path to the log file to collect from the agent computer. Check the agent computer to verify that this is correct.
@@ -133,9 +133,9 @@ Open IIS Manager and verify that the logs are being written in W3C format.
133
133
134
134
:::image type="content" source="media/data-collection-text-log/iis-log-format-setting.png" lightbox="media/data-collection-text-log/iis-log-format-setting.png" alt-text="Screenshot of IIS logging configuration dialog box on agent machine.":::
135
135
136
-
Open the IIS log on the agent machine to verify logs are in W3C format.
136
+
Open the IIS log file on the agent machine to verify that logs are in W3C format.
137
137
138
-
:::image type="content" source="media/data-collection-text-log/iis-log-format.png" lightbox="media/data-collection-text-log/iis-log-format.png" alt-text="Screenshot of an IIS log on an agent machine showing the header specifies W3C format.":::
138
+
:::image type="content" source="media/data-collection-text-log/iis-log-format.png" lightbox="media/data-collection-text-log/iis-log-format.png" alt-text="Screenshot of an IIS log, showing the header, which specifies that the file is in W3C format.":::
139
139
140
140
### Share logs with Microsoft
141
141
If everything is configured properly, but you're still not collecting log data, use the following procedure to collect diagnostics logs for Azure Monitor agent to share with the Azure Monitor group.
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/data-collection-rule-azure-monitor-agent.md
+3-9Lines changed: 3 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Monitor data from virtual machines with Azure Monitor Agent
2
+
title: Collect events and performance counters from virtual machines with Azure Monitor Agent
3
3
description: Describes how to collect events and performance data from virtual machines by using Azure Monitor Agent.
4
4
ms.topic: conceptual
5
5
ms.date: 12/11/2022
@@ -9,21 +9,15 @@ ms.reviewer: shseth
9
9
10
10
---
11
11
12
-
# Collect data from virtual machines with Azure Monitor Agent
12
+
# Collect events and performance counters from virtual machines with Azure Monitor Agent
13
13
14
14
This article describes how to collect events and performance counters from virtual machines by using [Azure Monitor Agent](azure-monitor-agent-overview.md).
15
15
16
16
## Prerequisites
17
17
To complete this procedure, you need:
18
18
19
19
- Log Analytics workspace where you have at least [contributor rights](../logs/manage-access.md#azure-rbac).
-[Permissions to create Data Collection Rule objects](../essentials/data-collection-rule-overview.md#permissions) in the workspace.
22
-
- A VM, Virtual Machine Scale Set, or Arc-enabled on-premises server with the logs you want to collect.
23
-
24
-
- The log file must be stored on a local drive of the machine on which Azure Monitor Agent is running.
25
-
- Each entry in the log file must be delineated with an end of line.
26
-
- The log file must not allow circular logging, log rotation where the file is overwritten with new entries or renaming where a file is moved and a new file with the same name is opened.
27
21
28
22
## Create a data collection rule
29
23
@@ -119,7 +113,7 @@ For sample templates, see [Azure Resource Manager template samples for data coll
119
113
120
114
## Filter events using XPath queries
121
115
122
-
Since you're charged for any data you collect in a Log Analytics workspace, you should limit data collection from your agent to only the event data that you need. The basic configuration in the Azure portal provides you with a limited ability to filter out events.
116
+
You're charged for any data you collect in a Log Analytics workspace. Therefore, you should only collect the event data you need. The basic configuration in the Azure portal provides you with a limited ability to filter out events.
-[Custom table](../logs/create-custom-table.md) to send your logs to.
21
21
-[Permissions to create Data Collection Rule objects](../essentials/data-collection-rule-overview.md#permissions) in the workspace.
22
-
- A machine that write logs to a text file.
22
+
- A VM, Virtual Machine Scale Set, or Arc-enabled on-premises server that writes logs to a text file.
23
+
- The log file must be stored on the local drive of the machine on which Azure Monitor Agent is running.
24
+
- Each entry in the log file must be delineated with an end of line.
25
+
- The log file must not allow circular logging, log rotation where the file is overwritten with new entries, or renaming where a file is moved and a new file with the same name is opened.
23
26
24
27
## Create data collection rule to collect text logs
0 commit comments