Skip to content

Commit 83c8a17

Browse files
committed
resolve comment, 260119
1 parent 4e408db commit 83c8a17

3 files changed

Lines changed: 17 additions & 116 deletions

File tree

articles/azure-app-configuration/faq.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -118,10 +118,6 @@ sections:
118118
119119
Premium tier stores also have a daily usage charge and include a replica. The first 800,000 requests for the origin and the first 800,000 requests for the replica each day are included in the daily charge. Requests exceeding this daily allocation incur an overage charge.
120120
121-
- question: How do I identify who has accessed my App Configuration store?
122-
answer: |
123-
To see who has accessed your App Configuration store, see [Activity logs](./monitor-app-configuration.md#activity-logs). To see who has accessed your data plane resources, see [Resource logs](./monitor-app-configuration.md#resource-logs).
124-
125121
- question: Can I upgrade or downgrade an App Configuration store?
126122
answer: |
127123
You can upgrade an App Configuration store at any time, for example, from the Free tier to the Developer, Standard or Premium tier, or from the Developer, Standard tier to the Premium tier.
@@ -194,6 +190,10 @@ sections:
194190
answer: |
195191
All App Configuration stores in the Standard and Premium tiers support the [soft-delete](concept-soft-delete.md) feature, which can't be disabled. You can recover a deleted store within its retention period. Follow these [instructions](howto-recover-deleted-stores-in-azure-app-configuration.md) to recover a mistakenly deleted App Configuration store.
196192
193+
- question: How do I determine who has accessed my App Configuration store?
194+
answer: |
195+
Use [Activity logs](./monitor-app-configuration.md#activity-logs) to see who accessed or modified the control plane of your App Configuration store. Use [Resource logs](./monitor-app-configuration.md#resource-logs) to identify who accessed the data plane.
196+
197197
- question: Can I create and update feature flags or Key Vault references programmatically?
198198
answer: |
199199
Yes. While you can manage feature flags and Key Vault references in App Configuration through the Azure portal or CLI, you can also create and update them programmatically using App Configuration SDKs. Therefore, you can write your customized management portal or manage them in your CI/CD programmatically. The feature flag and Key Vault reference APIs are available in SDKs of all supported languages. Check out the [sample links](https://github.com/Azure/AppConfiguration#sdks) for examples in each supported language.

articles/azure-app-configuration/monitor-app-configuration-reference.md

Lines changed: 0 additions & 101 deletions
This file was deleted.

articles/azure-app-configuration/monitor-app-configuration.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Resource Logs (including audit logs and HTTP request logs) aren't collected and
8686

8787
1. Open the Azure Cloud Shell, or if you installed the Azure CLI locally, open a command console application such as Windows PowerShell.
8888

89-
1. If your identity is associated with more than one subscription, then set your active subscription to the subscription of the storage account that you want to enable logs for.
89+
1. If your identity is associated with more than one subscription, then set your active subscription to the subscription of the App Configuration store that you want to enable logs for.
9090

9191
```Azure CLI
9292
az account set --subscription <your-subscription-id>
@@ -184,29 +184,31 @@ Following are sample queries that you can use to help you monitor your App Confi
184184
AACHttpRequest
185185
| where TimeGenerated > ago(14d)
186186
| extend Day = startofday(TimeGenerated)
187-
| summarize requestcount=sum(HitCount) by Day
187+
| summarize requestCount=sum(HitCount) by Day
188188
| order by Day desc
189189
```
190190
191191
You can also view the logs in **Logs** blade in the Log Analytics workspace if you have the **Log Analytics Reader** role on the workspace. For detailed information on Log Analytics workspace access control, see [Manage access to Log Analytics workspaces](/azure/azure-monitor/logs/manage-access#built-in-roles).
192192
193-
Regarding the log query scope, when you select **Monitoring** > **Logs** from the App Configuration menu, Log Analytics is opened with the query scope set to the current app configuration resource. This means that log queries will only include data from that resource. If you want to run a query that includes data from other configuration or data from other Azure services, select **Logs** in the Log Analytics workspace. See [Log query scope and time range in Azure Monitor Log Analytics](/azure/azure-monitor/log-query/scope/) for details.
193+
Regarding the log query scope, when you select **Monitoring** > **Logs** from the App Configuration menu, Log Analytics is opened with the query scope set to the current App Configuration resource. This means that log queries will only include data from that resource. If you want to run a query that includes data from other configuration store or data from other Azure services, select **Logs** in the Log Analytics workspace. See [Log query scope and time range in Azure Monitor Log Analytics](/azure/azure-monitor/log-query/scope/) for details.
194194
195195
#### Data access tracking
196-
Caller identity information is present in Azure App Configuration's Audit and HTTP request logs. To identify who is making changes to your App Configuration store, the recommended way is to use audit logs. Audit logs include caller identity, caller IP address, the action performed, and the target resource. Use **CallerIdentity** to correlate a change with the specific caller. Audit logs are only produced for write operations.
196+
Caller identity information is present in Azure App Configuration's Audit and HTTP request logs.
197197
198-
Unlike Audit logs, HTTP request logs are emitted for read operations. Due to the fact these logs are aggregated, some caller identity details may be lost as part of the aggregation process. HTTP request logs are best for understanding request patterns and performance characteristics such as user agent, request duration, and request volume. The **ClientObjectId**, **ClientTenantId**, and **AccessKeyId** fields provide caller context.
198+
To identify who is making changes to your App Configuration store, the recommended way is to use audit logs. Audit logs include caller identity, caller IP address, the action performed, and the target resource. Use **CallerIdentity** to correlate a change with the specific caller. Audit logs are only produced for write operations.
199+
200+
HTTP request logs are generated for both write and read operations. Due to the fact these logs are aggregated, some caller identity details may be lost as part of the aggregation process. HTTP request logs are best for understanding request patterns and performance characteristics such as user agent, request duration, and request volume. The **ClientObjectId**, **ClientTenantId**, and **AccessKeyId** fields provide caller context.
199201
200202
| Log type | Logged operations | Is aggregated |
201203
|-------|-----|-----|
202204
| Audit | Write | No |
203205
| HTTP Requests | Read, Write | Yes |
204206
205-
Two authentication methods are supported, which are Extra ID and access key (HMAC/connection string). If you use Extra ID, you should see information about caller or client. If you use access key, you should see information related to access key. To enforce Extra ID authentication and remove access key usage for better security, see [disable access key authentication](/azure/azure-app-configuration/howto-disable-access-key-authentication?tabs=portal#disable-access-key-authentication).
207+
App Configuration supports Microsoft Entra ID authentication and access key-based authentication. If you authenticate with an Extra ID, you can retrieve the client object ID and client tenant ID to identify the caller. If you authenticate with an access key, you can retrieve the access key ID to determine which key was used.
206208
207209
Following are sample queries for the **AACAudit** and **AACHttpRequest** tables that show caller identity information.
208210
209-
* Identify key-value modifications in audit logs in the last 7 days, extracting operation name, resource, the principal identifier (CallerIdentity), source IP address (CallerIPAddress):
211+
* Identify key-value changes in the audit logs from the past seven days, extracting the operation name, target resource, caller identity, and caller IP address.
210212
211213
```Kusto
212214
AACAudit
@@ -216,7 +218,7 @@ Following are sample queries for the **AACAudit** and **AACHttpRequest** tables
216218
| sort by TimeGenerated desc
217219
```
218220
219-
* Identify key-value writes and reads in HTTP request logs in the last 7 days, extracting method, resource, status code, client object ID, client tenant ID, access key ID, client IP address, user agent:
221+
* Identify keyvalue read and write operations in HTTP request logs from the past seven days, extracting the HTTP method, request URI, status code, client object ID, client tenant ID, access key ID, client IP address, user agent, and hit count.
220222
221223
```Kusto
222224
AACHttpRequest
@@ -228,18 +230,18 @@ Following are sample queries for the **AACAudit** and **AACHttpRequest** tables
228230
229231
## Alerts
230232
231-
Azure Monitor alerts proactively notify you when important conditions are found in your monitoring data. They allow you to identify and address issues in your system before your customers notice them. You can set alerts on [metrics](/azure/azure-monitor/alerts/alerts-metric-overview), [logs](/azure/azure-monitor/alerts/alerts-unified-log), and the [activity log](/azure/azure-monitor/alerts/activity-log-alerts). Different types of alerts have benefits and drawbacks.
233+
Azure Monitor alerts notify you when significant conditions appear in your monitoring data, helping you detect and resolve issues before they impact your service or applications. You can configure alerts based on [metrics](/azure/azure-monitor/alerts/alerts-types#metric-alerts), [logs](/azure/azure-monitor/alerts/alerts-types#log-alerts), and the [activity log](/azure/azure-monitor/alerts/alerts-types#activity-log-alerts). Each alert type offers distinct advantages and trade‑offs.
232234
233235
The following table lists common and recommended alert rules for App Configuration.
234236
235237
| Alert type | Condition | Description  |
236238
|:---|:---|:---|
237-
|Request quota usage exceeded | RequestQuotaUsage >= 100 | The configuration store has exceeded the [request quota usage](./faq.yml#are-there-any-limits-on-the-number-of-requests-made-to-app-configuration). Upgrade your store or follow the [best practices](./howto-best-practices.md#reduce-requests-made-to-app-configuration) to optimize your usage. |
239+
|Request quota usage| RequestQuotaUsage > 80 | The configuration store has consumed over 80% of the [request quota](./faq.yml#are-there-any-limits-on-the-number-of-requests-made-to-app-configuration). Upgrade your store or follow the [best practices](./howto-best-practices.md#reduce-requests-made-to-app-configuration) to optimize your usage. |
238240
239241
## Schema reference
240242
241243
### Metrics schema
242-
[App Configuration Metrics](/azure/azure-monitor/reference/supported-metrics/microsoft-appconfiguration-configurationstores-metrics)
244+
For details on the metrics schema, see [App Configuration Metrics](/azure/azure-monitor/reference/supported-metrics/microsoft-appconfiguration-configurationstores-metrics)
243245
244246
### Logs schema
245247

0 commit comments

Comments
 (0)