Skip to content

Commit ce899de

Browse files
authored
Merge pull request #108576 from DavidTrigano/patch-2
Update sql-database-auditing.md
2 parents 2e9fa6b + 1f2f6ef commit ce899de

File tree

1 file changed

+5
-14
lines changed

1 file changed

+5
-14
lines changed

articles/sql-database/sql-database-auditing.md

Lines changed: 5 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Get started with auditing
2+
title: Azure SQL Auditing
33
description: Use Azure SQL database auditing to track database events into an audit log.
44
services: sql-database
55
ms.service: sql-database
@@ -78,12 +78,6 @@ The following section describes the configuration of auditing using the Azure po
7878

7979
5. **New** - You now have multiple options for configuring where audit logs will be written. You can write logs to an Azure storage account, to a Log Analytics workspace for consumption by Azure Monitor logs, or to event hub for consumption using event hub. You can configure any combination of these options, and audit logs will be written to each.
8080

81-
> [!NOTE]
82-
> Customer wishing to configure an immutable log store for their server- or database-level audit events should follow the [instructions provided by Azure Storage](https://docs.microsoft.com/azure/storage/blobs/storage-blob-immutability-policies-manage#enabling-allow-protected-append-blobs-writes)
83-
84-
> [!WARNING]
85-
> Enabling auditing to Log Analytics will incur cost based on ingestion rates. Please be aware of the associated cost with using this [option](https://azure.microsoft.com/pricing/details/monitor/), or consider storing the audit logs in an Azure storage account.
86-
8781
![storage options](./media/sql-database-auditing-get-started/auditing-select-destination.png)
8882

8983
### <a id="audit-storage-destination">Audit to storage destination</a>
@@ -93,25 +87,22 @@ To configure writing audit logs to a storage account, select **Storage** and ope
9387
> [!IMPORTANT]
9488
> - The default value for retention period is 0 (unlimited retention). You can change this value by moving the **Retention (Days)** slider in **Storage settings** when configuring the storage account for auditing.
9589
> - If you change retention period from 0 (unlimited retention) to any other value, please note that retention will only apply to logs written after retention value was changed (logs written during the period when retention was set to unlimited are preserved, even after retention is enabled)
96-
90+
> - Customer wishing to configure an immutable log store for their server- or database-level audit events should follow the [instructions provided by Azure Storage](https://docs.microsoft.com/azure/storage/blobs/storage-blob-immutability-policies-manage#enabling-allow-protected-append-blobs-writes) (Please ensure you have selected **Allow selected Appends** when you configure the immutable blob storage)
91+
9792
![storage account](./media/sql-database-auditing-get-started/auditing_select_storage.png)
9893

99-
To configure a storage account behind a virtual network or firewall you will need an [Active Directory admin](https://docs.microsoft.com/azure/sql-database/sql-database-aad-authentication-configure?tabs=azure-powershell#provision-an-azure-active-directory-administrator-for-your-managed-instance) on the server, enable **Allow trusted Microsoft services to access this storage account** on the storage account. In addition, you need to have the 'Microsoft.Authorization/roleAssignments/write' permission on the selected storage account.
100-
101-
We recommend you to be [User Access Administrator](../role-based-access-control/built-in-roles.md#user-access-administrator) in order to grant to the managed identity the role 'storage blob data contributor'. To learn more about permissions and role-based access control, see [What is role-based access control (RBAC) for Azure resources?](../role-based-access-control/overview.md) and [Add or remove role assignments using Azure RBAC and the Azure portal](../role-based-access-control/role-assignments-portal.md)
102-
10394
#### Log audits to storage account behind VNet or firewall
10495

10596
You can write audit logs to a an Azure Storage account behind a VNet or firewall. For specific instructions see, [Write audit to a storage account behind VNet and firewall](create-auditing-storage-account-vnet-firewall.md).
10697

10798
### <a id="audit-log-analytics-destination">Audit to Log Analytics destination</a>
10899

109100
To configure writing audit logs to a Log Analytics workspace, select **Log Analytics (Preview)** and open **Log Analytics details**. Select or create the Log Analytics workspace where logs will be written and then click **OK**.
110-
111-
![LogAnalyticsworkspace](./media/sql-database-auditing-get-started/auditing_select_oms.png)
112101

113102
> [!WARNING]
114103
> Enabling auditing to Log Analytics will incur cost based on ingestion rates. Please be aware of the associated cost with using this [option](https://azure.microsoft.com/pricing/details/monitor/), or consider storing the audit logs in an Azure storage account.
104+
105+
![LogAnalyticsworkspace](./media/sql-database-auditing-get-started/auditing_select_oms.png)
115106

116107
### <a id="audit-event-hub-destination">Audit to Event Hub destination</a>
117108

0 commit comments

Comments
 (0)