Skip to content

Commit efc3845

Browse files
committed
Fixing some validation issues
1 parent ed4ace1 commit efc3845

File tree

6 files changed

+22
-22
lines changed

6 files changed

+22
-22
lines changed

articles/storage/blobs/blob-storage-monitoring-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ StorageBlobLogs
163163

164164
For security reasons, SAS tokens don't appear in logs. However, the SHA-256 hash of the SAS token will appear in the `AuthenticationHash` field that is returned by this query.
165165

166-
If you've distributed several SAS tokens, and you want to know which SAS tokens are being used, you'll have to convert each of your SAS tokens to a SHA-256 hash, and then compare that hash to the hash value that appears in logs.
166+
If you've distributed several SAS tokens, and you want to know which SAS tokens are being used, you'll have to convert each of your SAS tokens to an SHA-256 hash, and then compare that hash to the hash value that appears in logs.
167167

168168
First decode each SAS token string. The following example decodes a SAS token string by using PowerShell.
169169

articles/storage/blobs/monitor-blob-storage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ To collect resource logs, you must create a diagnostic setting. When you create
6262
> [!NOTE]
6363
> Data Lake Storage Gen2 doesn't appear as a storage type. That's because Data Lake Storage Gen2 is a set of capabilities available to Blob storage.
6464
65-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource manager template or an Azure Policy definition.
65+
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource Manager template or an Azure Policy definition.
6666

6767
## Destination limitations
6868

@@ -306,22 +306,22 @@ The following example shows how to read metric data on the metric supporting mul
306306

307307
## Analyzing logs
308308

309-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
309+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
310310

311311
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Blob Storage resource logs is found in [Azure Blob Storage monitoring data reference](monitor-blob-storage-reference.md).
312312

313313
To get the list of SMB and REST operations that are logged, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages).
314314

315315
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its file endpoint but not in its table or queue endpoints, only logs that pertain to the Azure Blob Storage service are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
316316

317-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
317+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
318318

319319
### Log authenticated requests
320320

321321
The following types of authenticated requests are logged:
322322

323323
- Successful requests
324-
- Failed requests, including timeout, throttling, network, authorization, and other errors
324+
- Failed requests, including time out, throttling, network, authorization, and other errors
325325
- Requests that use a shared access signature (SAS) or OAuth, including failed and successful requests
326326
- Requests to analytics data (classic log data in the **$logs** container and class metric data in the **$metric** tables)
327327

articles/storage/common/sas-expiration-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ Follow these steps to assign the built-in policy to the appropriate scope in the
147147

148148
To monitor your storage accounts for compliance with the key expiration policy, follow these steps:
149149

150-
1. On the Azure Policy dashboard, locate the built-in policy definition for the scope that you specified in the policy assignment. You can search for *Storage accounts should have shared access signature (SAS) policies configured* in the **Search** box to filter for the built-in policy.
150+
1. On the Azure Policy dashboard, locate the built-in policy definition for the scope that you specified in the policy assignment. You can search for `Storage accounts should have shared access signature (SAS) policies configured` in the **Search** box to filter for the built-in policy.
151151
1. Select the policy name with the desired scope.
152152
1. On the **Policy assignment** page for the built-in policy, select **View compliance**. Any storage accounts in the specified subscription and resource group that do not meet the policy requirements appear in the compliance report.
153153

articles/storage/files/storage-files-monitoring.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---Azure
22
title: Monitoring Azure Files | Microsoft Docs
33
description: Learn how to monitor the performance and availability of Azure Files. Monitor Azure Files data, learn about configuration, and analyze metric and log data.
44
author: normesta
@@ -67,7 +67,7 @@ See [Create diagnostic setting to collect platform logs and metrics in Azure](..
6767

6868
For general destination limitations, see [Destination limitations](../../azure-monitor/essentials/diagnostic-settings.md#destination-limitations). The following limitations apply only to monitoring Azure Storage accounts.
6969

70-
- You can't send logs to the same storage account that you are monitoring with this setting.
70+
- You can't send logs to the same storage account that you're monitoring with this setting.
7171

7272
This would lead to recursive logs in which a log entry describes the writing of another log entry. You must create an account or use another existing account to store log information.
7373

@@ -298,15 +298,15 @@ The following example shows how to read metric data on the metric supporting mul
298298

299299
## Analyzing logs
300300

301-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
301+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
302302

303303
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Files resource logs is found in [Azure Files monitoring data reference](storage-files-monitoring-reference.md).
304304

305305
To get the list of SMB and REST operations that are logged, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages).
306306

307307
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its file endpoint but not in its table or queue endpoints, only logs that pertain to the Azure File service are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
308308

309-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
309+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
310310

311311

312312
### Log authenticated requests
@@ -411,7 +411,7 @@ The following table lists some example scenarios to monitor and the proper metri
411411
2. In the **Monitoring** section, click **Alerts**, and then click **+ New alert rule**.
412412
3. Click **Edit resource**, select the **File resource type** for the storage account and then click **Done**. For example, if the storage account name is `contoso`, select the `contoso/file` resource.
413413
4. Click **Add condition** to add a condition.
414-
5. You will see a list of signals supported for the storage account, select the **Transactions** metric.
414+
5. You'll see a list of signals supported for the storage account, select the **Transactions** metric.
415415
6. On the **Configure signal logic** blade, click the **Dimension name** drop-down and select **Response type**.
416416
7. Click the **Dimension values** drop-down and select the appropriate response types for your file share.
417417

@@ -442,7 +442,7 @@ The following table lists some example scenarios to monitor and the proper metri
442442
10. Define the **alert parameters** (threshold value, operator, aggregation granularity and frequency of evaluation) and click **Done**.
443443

444444
> [!TIP]
445-
> If you are using a static threshold, the metric chart can help determine a reasonable threshold value if the file share is currently being throttled. If you are using a dynamic threshold, the metric chart will display the calculated thresholds based on recent data.
445+
> If you are using a static threshold, the metric chart can help determine a reasonable threshold value if the file share is currently being throttled. If you're using a dynamic threshold, the metric chart will display the calculated thresholds based on recent data.
446446
447447
11. Click **Add action groups** to add an **action group** (email, SMS, etc.) to the alert either by selecting an existing action group or creating a new action group.
448448
12. Fill in the **Alert details** like **Alert rule name**, **Description**, and **Severity**.
@@ -454,7 +454,7 @@ The following table lists some example scenarios to monitor and the proper metri
454454
2. In the **Monitoring** section, click **Alerts** and then click **+ New alert rule**.
455455
3. Click **Edit resource**, select the **File resource type** for the storage account and then click **Done**. For example, if the storage account name is `contoso`, select the `contoso/file` resource.
456456
4. Click **Add condition** to add a condition.
457-
5. You will see a list of signals supported for the storage account, select the **File Capacity** metric.
457+
5. You'll see a list of signals supported for the storage account, select the **File Capacity** metric.
458458
6. For **premium file shares**, click the **Dimension name** drop-down and select **File Share**. For **standard file shares**, skip to **step #8**.
459459

460460
> [!NOTE]
@@ -473,7 +473,7 @@ The following table lists some example scenarios to monitor and the proper metri
473473
2. In the Monitoring section, click **Alerts** and then click **+ New alert rule**.
474474
3. Click **Edit resource**, select the **File resource type** for the storage account and then click **Done**. For example, if the storage account name is contoso, select the contoso/file resource.
475475
4. Click **Add condition** to add a condition.
476-
5. You will see a list of signals supported for the storage account, select the **Egress** metric.
476+
5. You'll see a list of signals supported for the storage account, select the **Egress** metric.
477477
6. For **premium file shares**, click the **Dimension name** drop-down and select **File Share**. For **standard file shares**, skip to **step #8**.
478478

479479
> [!NOTE]

articles/storage/queues/monitor-queue-storage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To collect resource logs, you must create a diagnostic setting. When you create
5858
| **StorageWrite** | Write operations on objects. |
5959
| **StorageDelete** | Delete operations on objects. |
6060

61-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource manager template or an Azure Policy definition.
61+
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource Manager template or an Azure Policy definition.
6262

6363
## Destination limitations
6464

@@ -302,7 +302,7 @@ The following example shows how to read metric data on the metric supporting mul
302302

303303
****
304304

305-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
305+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
306306

307307
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Queue Storage resource logs is found in [Azure Queue Storage monitoring data reference](monitor-queue-storage-reference.md).
308308

@@ -312,7 +312,7 @@ Log entries are created only if there are requests made against the service endp
312312

313313
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its queue endpoint but not in its table or blob endpoints, only logs that pertain to Queue Storage are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
314314

315-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
315+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
316316

317317

318318
### Log authenticated requests
@@ -332,7 +332,7 @@ The following types of anonymous requests are logged:
332332

333333
- Successful requests
334334
- Server errors
335-
- Time-out errors for both client and server
335+
- Time out errors for both client and server
336336
- Failed `GET` requests with the error code 304 (`Not Modified`)
337337

338338
All other failed anonymous requests aren't logged. For a full list of the logged data, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages) and [Storage log format](monitor-queue-storage-reference.md).

articles/storage/tables/monitor-table-storage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ To collect resource logs, you must create a diagnostic setting. When you create
5757
| StorageWrite | Write operations on objects. |
5858
| StorageDelete | Delete operations on objects. |
5959

60-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource manager template or an Azure Policy definition.
60+
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource Manager template or an Azure Policy definition.
6161

6262
## Destination limitations
6363

@@ -300,15 +300,15 @@ The following example shows how to read metric data on the metric supporting mul
300300

301301
## Analyzing logs
302302

303-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
303+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
304304

305305
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Table Storage resource logs is found in [Azure Table storage monitoring data reference](monitor-table-storage-reference.md).
306306

307307
To get the list of SMB and REST operations that are logged, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages).
308308

309309
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its file endpoint but not in its table or queue endpoints, only logs that pertain to the Azure Blob Storage service are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
310310

311-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
311+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
312312

313313
### Log authenticated requests
314314

@@ -327,7 +327,7 @@ Requests made by the Table storage service itself, such as log creation or delet
327327

328328
- Successful requests
329329
- Server errors
330-
- Time-out errors for both client and server
330+
- Time out errors for both client and server
331331
- Failed GET requests with the error code 304 (Not Modified)
332332

333333
All other failed anonymous requests aren't logged. For a full list of the logged data, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages) and [Storage log format](monitor-table-storage-reference.md).

0 commit comments

Comments
 (0)