You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/blob-storage-monitoring-scenarios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,7 @@ StorageBlobLogs
163
163
164
164
For security reasons, SAS tokens don't appear in logs. However, the SHA-256 hash of the SAS token will appear in the `AuthenticationHash` field that is returned by this query.
165
165
166
-
If you've distributed several SAS tokens, and you want to know which SAS tokens are being used, you'll have to convert each of your SAS tokens to a SHA-256 hash, and then compare that hash to the hash value that appears in logs.
166
+
If you've distributed several SAS tokens, and you want to know which SAS tokens are being used, you'll have to convert each of your SAS tokens to an SHA-256 hash, and then compare that hash to the hash value that appears in logs.
167
167
168
168
First decode each SAS token string. The following example decodes a SAS token string by using PowerShell.
Copy file name to clipboardExpand all lines: articles/storage/blobs/monitor-blob-storage.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ To collect resource logs, you must create a diagnostic setting. When you create
62
62
> [!NOTE]
63
63
> Data Lake Storage Gen2 doesn't appear as a storage type. That's because Data Lake Storage Gen2 is a set of capabilities available to Blob storage.
64
64
65
-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource manager template or an Azure Policy definition.
65
+
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource Manager template or an Azure Policy definition.
66
66
67
67
## Destination limitations
68
68
@@ -306,22 +306,22 @@ The following example shows how to read metric data on the metric supporting mul
306
306
307
307
## Analyzing logs
308
308
309
-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
309
+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
310
310
311
311
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Blob Storage resource logs is found in [Azure Blob Storage monitoring data reference](monitor-blob-storage-reference.md).
312
312
313
313
To get the list of SMB and REST operations that are logged, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages).
314
314
315
315
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its file endpoint but not in its table or queue endpoints, only logs that pertain to the Azure Blob Storage service are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
316
316
317
-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
317
+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
318
318
319
319
### Log authenticated requests
320
320
321
321
The following types of authenticated requests are logged:
322
322
323
323
- Successful requests
324
-
- Failed requests, including timeout, throttling, network, authorization, and other errors
324
+
- Failed requests, including time out, throttling, network, authorization, and other errors
325
325
- Requests that use a shared access signature (SAS) or OAuth, including failed and successful requests
326
326
- Requests to analytics data (classic log data in the **$logs** container and class metric data in the **$metric** tables)
Copy file name to clipboardExpand all lines: articles/storage/common/sas-expiration-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,7 +147,7 @@ Follow these steps to assign the built-in policy to the appropriate scope in the
147
147
148
148
To monitor your storage accounts for compliance with the key expiration policy, follow these steps:
149
149
150
-
1. On the Azure Policy dashboard, locate the built-in policy definition for the scope that you specified in the policy assignment. You can search for *Storage accounts should have shared access signature (SAS) policies configured* in the **Search** box to filter for the built-in policy.
150
+
1. On the Azure Policy dashboard, locate the built-in policy definition for the scope that you specified in the policy assignment. You can search for `Storage accounts should have shared access signature (SAS) policies configured` in the **Search** box to filter for the built-in policy.
151
151
1. Select the policy name with the desired scope.
152
152
1. On the **Policy assignment** page for the built-in policy, select **View compliance**. Any storage accounts in the specified subscription and resource group that do not meet the policy requirements appear in the compliance report.
Copy file name to clipboardExpand all lines: articles/storage/files/storage-files-monitoring.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
---
1
+
---Azure
2
2
title: Monitoring Azure Files | Microsoft Docs
3
3
description: Learn how to monitor the performance and availability of Azure Files. Monitor Azure Files data, learn about configuration, and analyze metric and log data.
4
4
author: normesta
@@ -67,7 +67,7 @@ See [Create diagnostic setting to collect platform logs and metrics in Azure](..
67
67
68
68
For general destination limitations, see [Destination limitations](../../azure-monitor/essentials/diagnostic-settings.md#destination-limitations). The following limitations apply only to monitoring Azure Storage accounts.
69
69
70
-
- You can't send logs to the same storage account that you are monitoring with this setting.
70
+
- You can't send logs to the same storage account that you're monitoring with this setting.
71
71
72
72
This would lead to recursive logs in which a log entry describes the writing of another log entry. You must create an account or use another existing account to store log information.
73
73
@@ -298,15 +298,15 @@ The following example shows how to read metric data on the metric supporting mul
298
298
299
299
## Analyzing logs
300
300
301
-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
301
+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
302
302
303
303
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Files resource logs is found in [Azure Files monitoring data reference](storage-files-monitoring-reference.md).
304
304
305
305
To get the list of SMB and REST operations that are logged, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages).
306
306
307
307
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its file endpoint but not in its table or queue endpoints, only logs that pertain to the Azure File service are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
308
308
309
-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
309
+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
310
310
311
311
312
312
### Log authenticated requests
@@ -411,7 +411,7 @@ The following table lists some example scenarios to monitor and the proper metri
411
411
2. In the **Monitoring** section, click **Alerts**, and then click **+ New alert rule**.
412
412
3. Click **Edit resource**, select the **File resource type** for the storage account and then click **Done**. For example, if the storage account name is `contoso`, select the `contoso/file` resource.
413
413
4. Click **Add condition** to add a condition.
414
-
5. You will see a list of signals supported for the storage account, select the **Transactions** metric.
414
+
5. You'll see a list of signals supported for the storage account, select the **Transactions** metric.
415
415
6. On the **Configure signal logic** blade, click the **Dimension name** drop-down and select **Response type**.
416
416
7. Click the **Dimension values** drop-down and select the appropriate response types for your file share.
417
417
@@ -442,7 +442,7 @@ The following table lists some example scenarios to monitor and the proper metri
442
442
10. Define the **alert parameters** (threshold value, operator, aggregation granularity and frequency of evaluation) and click **Done**.
443
443
444
444
> [!TIP]
445
-
> If you are using a static threshold, the metric chart can help determine a reasonable threshold value if the file share is currently being throttled. If you are using a dynamic threshold, the metric chart will display the calculated thresholds based on recent data.
445
+
> If you are using a static threshold, the metric chart can help determine a reasonable threshold value if the file share is currently being throttled. If you're using a dynamic threshold, the metric chart will display the calculated thresholds based on recent data.
446
446
447
447
11. Click **Add action groups** to add an **action group** (email, SMS, etc.) to the alert either by selecting an existing action group or creating a new action group.
448
448
12. Fill in the **Alert details** like **Alert rule name**, **Description**, and **Severity**.
@@ -454,7 +454,7 @@ The following table lists some example scenarios to monitor and the proper metri
454
454
2. In the **Monitoring** section, click **Alerts** and then click **+ New alert rule**.
455
455
3. Click **Edit resource**, select the **File resource type** for the storage account and then click **Done**. For example, if the storage account name is `contoso`, select the `contoso/file` resource.
456
456
4. Click **Add condition** to add a condition.
457
-
5. You will see a list of signals supported for the storage account, select the **File Capacity** metric.
457
+
5. You'll see a list of signals supported for the storage account, select the **File Capacity** metric.
458
458
6. For **premium file shares**, click the **Dimension name** drop-down and select **File Share**. For **standard file shares**, skip to **step #8**.
459
459
460
460
> [!NOTE]
@@ -473,7 +473,7 @@ The following table lists some example scenarios to monitor and the proper metri
473
473
2. In the Monitoring section, click **Alerts** and then click **+ New alert rule**.
474
474
3. Click **Edit resource**, select the **File resource type** for the storage account and then click **Done**. For example, if the storage account name is contoso, select the contoso/file resource.
475
475
4. Click **Add condition** to add a condition.
476
-
5. You will see a list of signals supported for the storage account, select the **Egress** metric.
476
+
5. You'll see a list of signals supported for the storage account, select the **Egress** metric.
477
477
6. For **premium file shares**, click the **Dimension name** drop-down and select **File Share**. For **standard file shares**, skip to **step #8**.
Copy file name to clipboardExpand all lines: articles/storage/queues/monitor-queue-storage.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ To collect resource logs, you must create a diagnostic setting. When you create
58
58
|**StorageWrite**| Write operations on objects. |
59
59
|**StorageDelete**| Delete operations on objects. |
60
60
61
-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource manager template or an Azure Policy definition.
61
+
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource Manager template or an Azure Policy definition.
62
62
63
63
## Destination limitations
64
64
@@ -302,7 +302,7 @@ The following example shows how to read metric data on the metric supporting mul
302
302
303
303
****
304
304
305
-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
305
+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
306
306
307
307
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Queue Storage resource logs is found in [Azure Queue Storage monitoring data reference](monitor-queue-storage-reference.md).
308
308
@@ -312,7 +312,7 @@ Log entries are created only if there are requests made against the service endp
312
312
313
313
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its queue endpoint but not in its table or blob endpoints, only logs that pertain to Queue Storage are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
314
314
315
-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
315
+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
316
316
317
317
318
318
### Log authenticated requests
@@ -332,7 +332,7 @@ The following types of anonymous requests are logged:
332
332
333
333
- Successful requests
334
334
- Server errors
335
-
- Time-out errors for both client and server
335
+
- Timeout errors for both client and server
336
336
- Failed `GET` requests with the error code 304 (`Not Modified`)
337
337
338
338
All other failed anonymous requests aren't logged. For a full list of the logged data, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages) and [Storage log format](monitor-queue-storage-reference.md).
Copy file name to clipboardExpand all lines: articles/storage/tables/monitor-table-storage.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ To collect resource logs, you must create a diagnostic setting. When you create
57
57
| StorageWrite | Write operations on objects. |
58
58
| StorageDelete | Delete operations on objects. |
59
59
60
-
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource manager template or an Azure Policy definition.
60
+
See [Create diagnostic setting to collect platform logs and metrics in Azure](../../azure-monitor/platform/diagnostic-settings.md) for the detailed process for creating a diagnostic setting using the Azure portal, CLI, and PowerShell. You can also find links to information about how to create a diagnostic setting by using an Azure Resource Manager template or an Azure Policy definition.
61
61
62
62
## Destination limitations
63
63
@@ -300,15 +300,15 @@ The following example shows how to read metric data on the metric supporting mul
300
300
301
301
## Analyzing logs
302
302
303
-
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those log, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
303
+
You can access resource logs either as a blob in a storage account, as event data, or through Log Analytic queries. For information about how to find those logs, see [Azure resource logs](/azure/azure-monitor/essentials/resource-logs).
304
304
305
305
All resource logs in Azure Monitor have the same fields followed by service-specific fields. The common schema is outlined in [Azure Monitor resource log schema](/azure/azure-monitor/essentials/resource-logs-schema). The schema for Azure Table Storage resource logs is found in [Azure Table storage monitoring data reference](monitor-table-storage-reference.md).
306
306
307
307
To get the list of SMB and REST operations that are logged, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages).
308
308
309
309
Log entries are created only if there are requests made against the service endpoint. For example, if a storage account has activity in its file endpoint but not in its table or queue endpoints, only logs that pertain to the Azure Blob Storage service are created. Azure Storage logs contain detailed information about successful and failed requests to a storage service. This information can be used to monitor individual requests and to diagnose issues with a storage service. Requests are logged on a best-effort basis.
310
310
311
-
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
311
+
The [Activity log](/azure/azure-monitor/essentials/activity-log) is a type of platform log located in Azure that provides insight into subscription-level events. You can view it independently or route it to Azure Monitor Logs, where you can do much more complex queries using Log Analytics.
312
312
313
313
### Log authenticated requests
314
314
@@ -327,7 +327,7 @@ Requests made by the Table storage service itself, such as log creation or delet
327
327
328
328
- Successful requests
329
329
- Server errors
330
-
- Time-out errors for both client and server
330
+
- Timeout errors for both client and server
331
331
- Failed GET requests with the error code 304 (Not Modified)
332
332
333
333
All other failed anonymous requests aren't logged. For a full list of the logged data, see [Storage logged operations and status messages](/rest/api/storageservices/storage-analytics-logged-operations-and-status-messages) and [Storage log format](monitor-table-storage-reference.md).
0 commit comments