Skip to content

Commit 2baa87c

Browse files
committed
improve data access tracking part
1 parent ea3f0de commit 2baa87c

1 file changed

Lines changed: 7 additions & 2 deletions

File tree

articles/azure-app-configuration/monitor-app-configuration.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -219,9 +219,14 @@ The following queries are samples that you can use to help you monitor your App
219219
```
220220
221221
### Data access tracking
222-
To identify who is making changes to your App Configuration store, the recommended way is to use audit logs. Audit logs include caller identity, caller IP address, the action performed, and the target resource. Use **CallerIdentity** to correlate a change with the specific caller. Audit logs are only produced for write operations.
222+
Caller identity information is present in Azure App Configuration's HTTP request and Audit logs. Identify who is making changes to your App Configuration store, the recommended way is to use audit logs. Audit logs include caller identity, caller IP address, the action performed, and the target resource. Use **CallerIdentity** to correlate a change with the specific caller. Audit logs are only produced for write operations.
223223
224-
Use HTTP request logs to analyze read operations. Because these logs are aggregated by HTTP method and status code, some caller identity details may be lost during aggregation. HTTP request logs are best for understanding request patterns and performance characteristics such as user agent, request duration, and request volume. The **ClientObjectId**, **ClientTenantId**, and **AccessKeyId** fields provide caller context and help you determine whether the request used Extra ID or an access key.
224+
Unlike Audit logs, HTTP request logs are emitted for read operations. Due to the fact these logs are aggregated, some caller identity details may be lost as part of the aggregation process. HTTP request logs are best for understanding request patterns and performance characteristics such as user agent, request duration, and request volume. The **ClientObjectId**, **ClientTenantId**, and **AccessKeyId** fields provide caller context and help you determine whether the request used Extra ID or an access key.
225+
226+
| Log type | Logged operations | Is aggregated |
227+
|-------|-----|-----|
228+
| Audit | Write | No |
229+
| HTTP Requests | Read, Write | Yes |
225230
226231
Two authentication methods are supported, which are Extra ID and access key (HMAC/connection string). If you use Extra ID, you should see information about caller or client. If you use access key, you should see information related to access key. To enforce Extra ID authentication and remove access key usage, see [disable access key based authentication](/azure/azure-app-configuration/howto-disable-access-key-authentication?tabs=portal#disable-access-key-authentication).
227232

0 commit comments

Comments
 (0)