You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-data-collection-configure.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ The following table describes the parameters you need to provide values for in e
195
195
|`dataCollectionInterval`| Determines how often the agent collects data. Valid values are 1m - 30m in 1m intervals The default value is 1m. If the value is outside the allowed range, then it defaults to *1 m*. |
196
196
| `namespaceFilteringModeForDataCollection` | *Include*: Collects only data from the values in the *namespaces* field.<br>*Exclude*: Collects data from all namespaces except for the values in the *namespaces* field.<br>*Off*: Ignores any *namespace* selections and collect data on all namespaces.
197
197
|`namespacesForDataCollection`| Array of comma separated Kubernetes namespaces to collect inventory and perf data based on the _namespaceFilteringMode_.<br>For example, *namespaces = ["kube-system", "default"]* with an _Include_ setting collects only these two namespaces. With an _Exclude_ setting, the agent collects data from all other namespaces except for _kube-system_ and _default_. With an _Off_ setting, the agent collects data from all namespaces including _kube-system_ and _default_. Invalid and unrecognized namespaces are ignored. |
198
-
|`streams`| An array of container insights table streams. See [Stream values in DCR](#stream-values-in-dcr) for a list of the valid streams and their corresponding tables. |
198
+
|`streams`| An array of container insights table streams. See [Stream values in DCR](#stream-values-in-dcr) for a list of the valid streams and their corresponding tables. To enable [high scale mode](./container-insights-high-scale.md) for container logs, use `Microsoft-ContainerLogV2-HighScale`. |
199
199
|`useAzureMonitorPrivateLinkScope`| Specifies whether to use private link for the cluster connection to Azure Monitor. |
200
200
|`azureMonitorPrivateLinkScopeResourceId`| If private link is used, resource ID of the private link scope. |
201
201
@@ -237,6 +237,7 @@ When you specify the tables to collect using CLI or ARM, you specify a stream na
@@ -247,6 +248,9 @@ When you specify the tables to collect using CLI or ARM, you specify a stream na
247
248
| Microsoft-KubeServices | KubeServices |
248
249
| Microsoft-Perf | Perf |
249
250
251
+
<sup>1</sup> You shouldn't use both Microsoft-ContainerLogV2 and Microsoft-ContainerLogV2-HighScale in the same DCR. This will result in duplicate data.
252
+
253
+
250
254
## Share DCR with multiple clusters
251
255
When you enable Container insights on a Kubernetes cluster, a new DCR is created for that cluster, and the DCR for each cluster can be modified independently. If you have multiple clusters with custom monitoring configurations, you may want to share a single DCR with multiple clusters. You can then make changes to a single DCR that are automatically implemented for any clusters associated with it.
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-high-scale.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: High scale logs collection in Container Insights (Preview)
3
3
description: Enable high scale logs collection in Container Insights (Preview).
4
-
ms.custom: devx-track-azurecli
4
+
ms.topic: conceptual
5
5
ms.date: 08/06/2024
6
6
---
7
7
@@ -22,7 +22,7 @@ Use the following [log queries](../logs/log-query-overview.md) to determine whet
22
22
23
23
```kql
24
24
ContainerLogV2
25
-
| where _ResourceId = “<AzureResourceIdoftheAKSCluster>”
25
+
| where _ResourceId = "<AzureResourceIdoftheAKSCluster>"
26
26
| summarize count() by bin(TimeGenerated, 1s), Computer
27
27
| render timechart
28
28
```
@@ -31,7 +31,7 @@ ContainerLogV2
31
31
32
32
```kusto
33
33
ContainerLogV2
34
-
| where _ResourceId = “<AzureResourceIdoftheAKSCluster>”
34
+
| where _ResourceId = "<AzureResourceIdoftheAKSCluster>"
35
35
| summarize BillableDataMB = sum(_BilledSize)/1024/1024 by bin(TimeGenerated, 1s), Computer
36
36
| render timechart
37
37
```
@@ -62,10 +62,10 @@ The first step is to update configmap for the cluster to instruct the container
62
62
63
63
Follow the guidance in [Configure and deploy ConfigMap](./container-insights-data-collection-configmap.md#configure-and-deploy-configmap) to download and update ConfigMap for the cluster. The only different you need to make for high scale logs is to add the following entry under `agent-settings`:
64
64
65
-
```yml
66
-
[agent_settings.high_log_scale]
67
-
enabled = true
68
-
```
65
+
```yml
66
+
[agent_settings.high_log_scale]
67
+
enabled = true
68
+
```
69
69
70
70
After applying this configmap, `ama-logs-*` pods will get restarted automatically and configure the ama-logs daemonset pods to run in high scale log mode.
71
71
@@ -100,9 +100,10 @@ See [Create a private Azure Kubernetes Service (AKS) cluster](/azure/aks/private
100
100
-`--ampls-resource-id`
101
101
102
102
### [ARM](#tab/arm)
103
-
See [Enable Container insights](./kubernetes-monitoring-enable.md?tabs=arm#enable-container-insights) for guidance on enabling Container Insights using an ARM template. To enable high scale logs mode, add the following parameter to the ARM template.
103
+
See [Enable Container insights](./kubernetes-monitoring-enable.md?tabs=arm#enable-container-insights) for guidance on enabling Container Insights using an ARM template. To enable high scale logs mode, use `Microsoft-ContainerLogV2-HighScale` in the `streams` parameter.
104
104
105
-
The only requirement to enable high scale mode is to
105
+
> [!WARNING]
106
+
> Don't use both `Microsoft-ContainerLogV2` and `Microsoft-ContainerLogV2-HighScale` in the `streams` parameter. This will result in logs being collected in the standard mode.
0 commit comments