You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Ingestion Key Rotation and Log Flow Resolution in Azure Native New Relic Service
3
-
description: Learn how to resolve issues related to log flow after an ingestion key rotation in New Relic.
3
+
description: Learn how to resolve issues that are related to log flow after an ingestion key rotation in New Relic.
4
4
author: apoorvasingh130
5
5
ms.author: singhapoorva
6
6
ms.service: partner-services
@@ -13,23 +13,23 @@ ms.date: 04/24/2025
13
13
14
14
# Logs missing after the ingestion key rotation
15
15
16
-
If you rotated your ingestion key in the New Relic partner portal, log flow may stop because the Azure Native New Relic Service is still using the old key. This guide shows you how to resolve the issue and restore log flow.
16
+
If you rotated your ingestion key in the New Relic partner portal, log flow may stop because the Azure Native New Relic Service is still using the old key. This guide dicusses how to resolve the issue and restore log flow.
17
17
18
18
## Symptoms
19
19
20
-
You might observe log loss after you rotate the ingestion key on the New Relic partner portal. The log flow status may still be **Sending** on the **Monitored resources** page of the Azure New Relic resource.
20
+
You observe log loss after you rotate the ingestion key on the New Relic partner portal. The log flow status might still be in **Sending** mode on the **Monitored resources** page of the Azure New Relic resource.
21
21
22
22
## Cause
23
23
24
-
The issue occurs because Azure isn't notified of the ingestion key rotation. As a result, the old ingestion key remains stored in the configuration database. The log forwarder service continues to use the expired key to send logs. This causes authentication errors and results in log loss.
24
+
The issue occurs because Azure isn't notified of the ingestion key rotation. Therefore, the old ingestion key remains stored in the configuration database. The log forwarder service continues to use the expired key to send logs. This causes authentication errors and log loss.
25
25
26
26
## Workaround: Update the ingestion key manually
27
27
28
-
To work around the issue, manually update the ingestion key using the following API call:
28
+
To work around the issue, manually update the ingestion key by using the following API call:
29
29
30
-
1. Find the **resource ID** of the Azure New Relic resource associated with the account where the ingestion key was rotated. If multiple resources are linked to the same account, you can make the API call for any one of them.
30
+
1. Find the **resource ID** of the Azure New Relic resource that's associated with the account to which the ingestion key was rotated. If multiple resources are linked to the same account, you can make the API call for any of them.
31
31
32
-
2. Make the API call to update the ingestion key. Use an API client (like**Bruno**) to make a **POST** request to the following endpoint:
32
+
2. Make the API call to update the ingestion key. Use an API client (such as**Bruno**) to make a **POST** request to the following endpoint:
@@ -41,21 +41,22 @@ To work around the issue, manually update the ingestion key using the following
41
41
42
42
**Authorization**: Use a **Bearer Token** for authentication.
43
43
44
-
You can obtain the token using the **Network** tab of your browser's Developer tools:
44
+
You can obtain the token by using the **Network** tab of your browser's Developer tools:
45
45
46
-
1. In the browser, press F12 to open Developer tools. Select **Network**, and then select **Disable Cache**.
47
-
1. Open the [Azure portal](https://portal.azure.com) and while keeping the **Network tab** open, perform any basic operations like opening a resource.
48
-
1. Filter the result by **Fetch/XHR**. You can find a bearer token present in the request headers of the corresponding API call. Use it while it remains active.
46
+
1. In the browser, press F12 to open Developer tools.
47
+
2. Select **Network**, and then select **Disable Cache**.
48
+
1. Open the [Azure portal](https://portal.azure.com).
49
+
2. While keeping the **Network tab** open, perform any basic operations, such as opening a resource.
50
+
1. Filter the results by using **Fetch/XHR**. You can find a bearer token in the request headers of the corresponding API call. Use it while it remains active.
49
51
50
52
:::image type="content" source="media/ingestion-key-rotation-log-flow/get-token.png" alt-text="Screenshot showing how to view the access token." lightbox="media/ingestion-key-rotation-log-flow/get-token.png":::
51
-
3. The request should return a **204** status code that indicates the ingestion key has been successfully updated.
53
+
3. The request should return a **204** status code that indicates that the ingestion key was successfully updated.
52
54
53
55
> [!NOTE]
54
-
> It may take up to **24 hours** for log flow to resume due to cache resetting on the Azure side.
56
+
> Because of cache resetting on the Azure side, log flow might take up to 24 hours to resume.
55
57
56
58
## Troubleshooting
57
59
58
60
If you receive an error response, contact [**New Relic Support**](https://support.newrelic.com/s/) and provide the **correlation ID** (`x-ms-correlation-request-id`) from the response headers of your API call for further assistance.
0 commit comments