Skip to content

Commit 695942b

Browse files
authored
Update ingestion-key-rotation-log-flow.md
Edit review per CI 5732
1 parent 991fa56 commit 695942b

1 file changed

Lines changed: 16 additions & 15 deletions

File tree

Lines changed: 16 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Ingestion Key Rotation and Log Flow Resolution in Azure Native New Relic Service
3-
description: Learn how to resolve issues related to log flow after an ingestion key rotation in New Relic.
3+
description: Learn how to resolve issues that are related to log flow after an ingestion key rotation in New Relic.
44
author: apoorvasingh130
55
ms.author: singhapoorva
66
ms.service: partner-services
@@ -13,23 +13,23 @@ ms.date: 04/24/2025
1313

1414
# Logs missing after the ingestion key rotation
1515

16-
If you rotated your ingestion key in the New Relic partner portal, log flow may stop because the Azure Native New Relic Service is still using the old key. This guide shows you how to resolve the issue and restore log flow.
16+
If you rotated your ingestion key in the New Relic partner portal, log flow may stop because the Azure Native New Relic Service is still using the old key. This guide dicusses how to resolve the issue and restore log flow.
1717

1818
## Symptoms
1919

20-
You might observe log loss after you rotate the ingestion key on the New Relic partner portal. The log flow status may still be **Sending** on the **Monitored resources** page of the Azure New Relic resource.
20+
You observe log loss after you rotate the ingestion key on the New Relic partner portal. The log flow status might still be in **Sending** mode on the **Monitored resources** page of the Azure New Relic resource.
2121

2222
## Cause
2323

24-
The issue occurs because Azure isn't notified of the ingestion key rotation. As a result, the old ingestion key remains stored in the configuration database. The log forwarder service continues to use the expired key to send logs. This causes authentication errors and results in log loss.
24+
The issue occurs because Azure isn't notified of the ingestion key rotation. Therefore, the old ingestion key remains stored in the configuration database. The log forwarder service continues to use the expired key to send logs. This causes authentication errors and log loss.
2525

2626
## Workaround: Update the ingestion key manually
2727

28-
To work around the issue, manually update the ingestion key using the following API call:
28+
To work around the issue, manually update the ingestion key by using the following API call:
2929

30-
1. Find the **resource ID** of the Azure New Relic resource associated with the account where the ingestion key was rotated. If multiple resources are linked to the same account, you can make the API call for any one of them.
30+
1. Find the **resource ID** of the Azure New Relic resource that's associated with the account to which the ingestion key was rotated. If multiple resources are linked to the same account, you can make the API call for any of them.
3131

32-
2. Make the API call to update the ingestion key. Use an API client (like **Bruno**) to make a **POST** request to the following endpoint:
32+
2. Make the API call to update the ingestion key. Use an API client (such as **Bruno**) to make a **POST** request to the following endpoint:
3333

3434
```HTTP
3535
https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/NewRelic.Observability/monitors/{monitorName}/refreshIngestionKey
@@ -41,21 +41,22 @@ To work around the issue, manually update the ingestion key using the following
4141
4242
**Authorization**: Use a **Bearer Token** for authentication.
4343
44-
You can obtain the token using the **Network** tab of your browser's Developer tools:
44+
You can obtain the token by using the **Network** tab of your browser's Developer tools:
4545
46-
1. In the browser, press F12 to open Developer tools. Select **Network**, and then select **Disable Cache**.
47-
1. Open the [Azure portal](https://portal.azure.com) and while keeping the **Network tab** open, perform any basic operations like opening a resource.
48-
1. Filter the result by **Fetch/XHR**. You can find a bearer token present in the request headers of the corresponding API call. Use it while it remains active.
46+
1. In the browser, press F12 to open Developer tools.
47+
2. Select **Network**, and then select **Disable Cache**.
48+
1. Open the [Azure portal](https://portal.azure.com).
49+
2. While keeping the **Network tab** open, perform any basic operations, such as opening a resource.
50+
1. Filter the results by using **Fetch/XHR**. You can find a bearer token in the request headers of the corresponding API call. Use it while it remains active.
4951
5052
:::image type="content" source="media/ingestion-key-rotation-log-flow/get-token.png" alt-text="Screenshot showing how to view the access token." lightbox="media/ingestion-key-rotation-log-flow/get-token.png":::
51-
3. The request should return a **204** status code that indicates the ingestion key has been successfully updated.
53+
3. The request should return a **204** status code that indicates that the ingestion key was successfully updated.
5254
5355
> [!NOTE]
54-
> It may take up to **24 hours** for log flow to resume due to cache resetting on the Azure side.
56+
> Because of cache resetting on the Azure side, log flow might take up to 24 hours to resume.
5557
5658
## Troubleshooting
5759
5860
If you receive an error response, contact [**New Relic Support**](https://support.newrelic.com/s/) and provide the **correlation ID** (`x-ms-correlation-request-id`) from the response headers of your API call for further assistance.
5961
60-
61-
[!INCLUDE [Third-party disclaimer](../../includes/third-party-disclaimer.md)]
62+
[!INCLUDE [Third-party disclaimer](../../includes/third-party-disclaimer.md)]

0 commit comments

Comments
 (0)