You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/virtual-network-nsg-manage-log.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ You can use the [Azure portal](#azure-portal), [Azure PowerShell](#azure-powersh
34
34
35
35
1. Sign in to the [Azure portal](https://portal.azure.com).
36
36
1. In the search box at the top of the Azure portal, enter **network security groups**. Select **Network security groups** in the search results.
37
-
1. Select the NSG for which to enable logging.
37
+
1. Select the NSG for which you want to enable logging.
38
38
1. Under **Monitoring**, select **Diagnostic settings**, and then select **Add diagnostic setting**.
39
39
40
40
:::image type="content" source="./media/virtual-network-nsg-manage-log/turn-on-diagnostics.png" alt-text="Screenshot that shows the diagnostic settings for an NSG with Add diagnostic setting highlighted." lightbox="./media/virtual-network-nsg-manage-log/turn-on-diagnostics.png":::
@@ -115,7 +115,7 @@ nsgId=$(az network nsg show \
115
115
--output tsv)
116
116
```
117
117
118
-
You can write resource logs to different destination types. For more information, see [Log destinations](#log-destinations). In this article, logs are sent to a *Log Analytics workspace* destination, as an example. For more information, see [Log categories](#log-categories).
118
+
You can write resource logs to different destination types. For more information, see [Log destinations](#log-destinations). In this article, logs are sent to a Log Analytics workspace destination, as an example. For more information, see [Log categories](#log-categories).
119
119
120
120
Enable resource logging for the NSG with [az monitor diagnostic-settings create](/cli/azure/monitor/diagnostic-settings#az-monitor-diagnostic-settings-create). The following example logs both event and counter category data to an existing workspace named `myWorkspace`, which exists in a resource group named `myWorkspaces`. It uses the ID of the NSG that you saved by using the previous command.
121
121
@@ -149,7 +149,7 @@ JSON-formatted data is written for the following log categories: event and rule
149
149
150
150
### Event
151
151
152
-
The event log contains information about which NSG rules are applied to virtual machines, based on a MAC address. The following data is logged for each event. In the following example, the data is logged for a virtual machine with the IP address 192.168.1.4 and a MAC address of 00-0D-3A-92-6A-7C:
152
+
The event log contains information about which NSG rules are applied to virtual machines, based on a MAC address. The following data is logged for each event. In the following example, the data is logged for a virtual machine with the IP address 192.168.1.4 and a MAC address of 00-0D-3A-92-6A-7C.
153
153
154
154
```json
155
155
{
@@ -180,7 +180,7 @@ The event log contains information about which NSG rules are applied to virtual
180
180
181
181
### Rule counter
182
182
183
-
The rule counter log contains information about each rule applied to resources. The following example data is logged each time a rule is applied. In the following example, the data is logged for a virtual machine with the IP address 192.168.1.4 and a MAC address of 00-0D-3A-92-6A-7C:
183
+
The rule counter log contains information about each rule applied to resources. The following example data is logged each time a rule is applied. In the following example, the data is logged for a virtual machine with the IP address 192.168.1.4 and a MAC address of 00-0D-3A-92-6A-7C.
0 commit comments