Skip to content

Commit f035325

Browse files
committed
SME review edits
1 parent 66e68b2 commit f035325

File tree

1 file changed

+5
-4
lines changed

1 file changed

+5
-4
lines changed

articles/openshift/howto-enable-nsg-flowlogs.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,22 +18,23 @@ Flow logs allow you to analyze traffic for Network Security Groups in specific r
1818

1919
## Prerequisites
2020

21-
You must have an existing Azure Red Hat OpenShift cluster. Follow this guide to [create a private Azure Red Hat OpenShift cluster](howto-create-private-cluster-4x.md).
21+
You must have an existing Azure Red Hat OpenShift cluster. Follow [this guide](tutorial-create-cluster.md) to create a private Azure Red Hat OpenShift cluster.
2222

2323
## Configure Azure Network Watcher
2424

2525
Make sure an Azure Network Watcher exists in the applicable region or use the one existing by convention. For example, for the eastus region:
2626
```
2727
"subscriptions/{subscriptionID}/resourceGroups/NetworkWatcherRG/providers/Microsoft.Network/networkWatchers/NetworkWatcher_eastus"
2828
```
29+
See [Enable Azure Network Watcher](../network-watcher/enable-network-watcher-flow-log-settings.md)for more information.
2930

3031
## Create storage account
3132

32-
Create a storage account for storing the actual flow logs. It must be in the same region as where the flow logs are going to be created. It cannot be in the same resource group as the cluster's resources.
33+
[Create a storage account](../storage/common/storage-account-create.md) (or use an existing storage account) for storing the actual flow logs. It must be in the same region as where the flow logs are going to be created. It cannot be in the same resource group as the cluster's resources.
3334

3435
## Configure service principal
3536

36-
The service principal used by the cluster needs the [proper permissions](../network-watcher/required-rbac-permissions.md) in order to create necessary resources for the flow logs and to access the storage account. The easiest way to achieve that is by assigning it the network administrator and storage account contributor role on subscription level. Alternatively, you can create a custom role containing the required actions from the page linked above and assign it to the service principal.
37+
The service principal used by the cluster needs the [proper permissions](../network-watcher/required-rbac-permissions.md) in order to create the necessary resources for the flow logs, and to access the storage account. The easiest way to achieve that is by assigning it the network administrator and storage account contributor roles at the subscription level. Alternatively, you can create a custom role containing the required actions from the page linked above and assign it to the service principal.
3738

3839
To get the service principal ID, run the following command:
3940
```
@@ -53,7 +54,7 @@ az role assignment create --role "17d1049b-9a84-46fb-8f53-869881c3d3ab" --assign
5354
```
5455
See [Azure built-in roles](../role-based-access-control/built-in-roles.md) for IDs of built-in roles.
5556

56-
Create a spec as in the following example, or update the existing spec to contain `spec.nsgFlowLogs` in case you are already using another preview feature:
57+
Create a manifest as in the following example, or update the existing object to contain `spec.nsgFlowLogs` in case you are already using another preview feature:
5758
```
5859
apiVersion: "preview.aro.openshift.io/v1alpha1"
5960
kind: PreviewFeature

0 commit comments

Comments
 (0)