You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/faq.yml
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -118,10 +118,6 @@ sections:
118
118
119
119
Premium tier stores also have a daily usage charge and include a replica. The first 800,000 requests for the origin and the first 800,000 requests for the replica each day are included in the daily charge. Requests exceeding this daily allocation incur an overage charge.
120
120
121
-
- question: How do I identify who has accessed my App Configuration store?
122
-
answer: |
123
-
To see who has accessed your App Configuration store, see [Activity logs](./monitor-app-configuration.md#activity-logs). To see who has accessed your data plane resources, see [Resource logs](./monitor-app-configuration.md#resource-logs).
124
-
125
121
- question: Can I upgrade or downgrade an App Configuration store?
126
122
answer: |
127
123
You can upgrade an App Configuration store at any time, for example, from the Free tier to the Developer, Standard or Premium tier, or from the Developer, Standard tier to the Premium tier.
@@ -194,6 +190,10 @@ sections:
194
190
answer: |
195
191
All App Configuration stores in the Standard and Premium tiers support the [soft-delete](concept-soft-delete.md) feature, which can't be disabled. You can recover a deleted store within its retention period. Follow these [instructions](howto-recover-deleted-stores-in-azure-app-configuration.md) to recover a mistakenly deleted App Configuration store.
196
192
193
+
- question: How do I determine who has accessed my App Configuration store?
194
+
answer: |
195
+
Use [Activity logs](./monitor-app-configuration.md#activity-logs) to see who accessed or modified the control plane of your App Configuration store. Use [Resource logs](./monitor-app-configuration.md#resource-logs) to identify who accessed the data plane.
196
+
197
197
- question: Can I create and update feature flags or Key Vault references programmatically?
198
198
answer: |
199
199
Yes. While you can manage feature flags and Key Vault references in App Configuration through the Azure portal or CLI, you can also create and update them programmatically using App Configuration SDKs. Therefore, you can write your customized management portal or manage them in your CI/CD programmatically. The feature flag and Key Vault reference APIs are available in SDKs of all supported languages. Check out the [sample links](https://github.com/Azure/AppConfiguration#sdks) for examples in each supported language.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/monitor-app-configuration.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ Resource Logs (including audit logs and HTTP request logs) aren't collected and
86
86
87
87
1. Open the Azure Cloud Shell, or if you installed the Azure CLI locally, open a command console application such as Windows PowerShell.
88
88
89
-
1. If your identity is associated with more than one subscription, then set your active subscription to the subscription of the storage account that you want to enable logs for.
89
+
1. If your identity is associated with more than one subscription, then set your active subscription to the subscription of the App Configuration store that you want to enable logs for.
90
90
91
91
```Azure CLI
92
92
az account set --subscription <your-subscription-id>
@@ -184,29 +184,31 @@ Following are sample queries that you can use to help you monitor your App Confi
184
184
AACHttpRequest
185
185
| where TimeGenerated > ago(14d)
186
186
| extend Day = startofday(TimeGenerated)
187
-
| summarize requestcount=sum(HitCount) by Day
187
+
| summarize requestCount=sum(HitCount) by Day
188
188
| order by Day desc
189
189
```
190
190
191
191
You can also view the logs in **Logs** blade in the Log Analytics workspace if you have the **Log Analytics Reader** role on the workspace. For detailed information on Log Analytics workspace access control, see [Manage access to Log Analytics workspaces](/azure/azure-monitor/logs/manage-access#built-in-roles).
192
192
193
-
Regarding the log query scope, when you select **Monitoring** > **Logs** from the App Configuration menu, Log Analytics is opened with the query scope set to the current app configuration resource. This means that log queries will only include data from that resource. If you want to run a query that includes data from other configuration or data from other Azure services, select **Logs** in the Log Analytics workspace. See [Log query scope and time range in Azure Monitor Log Analytics](/azure/azure-monitor/log-query/scope/) for details.
193
+
Regarding the log query scope, when you select **Monitoring** > **Logs** from the App Configuration menu, Log Analytics is opened with the query scope set to the current App Configuration resource. This means that log queries will only include data from that resource. If you want to run a query that includes data from other configuration store or data from other Azure services, select **Logs** in the Log Analytics workspace. See [Log query scope and time range in Azure Monitor Log Analytics](/azure/azure-monitor/log-query/scope/) for details.
194
194
195
195
#### Data access tracking
196
-
Caller identity information is present in Azure App Configuration's Audit and HTTP request logs. To identify who is making changes to your App Configuration store, the recommended way is to use audit logs. Audit logs include caller identity, caller IP address, the action performed, and the target resource. Use **CallerIdentity** to correlate a change with the specific caller. Audit logs are only produced for write operations.
196
+
Caller identity information is present in Azure App Configuration's Audit and HTTP request logs.
197
197
198
-
Unlike Audit logs, HTTP request logs are emitted for read operations. Due to the fact these logs are aggregated, some caller identity details may be lost as part of the aggregation process. HTTP request logs are best for understanding request patterns and performance characteristics such as user agent, request duration, and request volume. The **ClientObjectId**, **ClientTenantId**, and **AccessKeyId** fields provide caller context.
198
+
To identify who is making changes to your App Configuration store, the recommended way is to use audit logs. Audit logs include caller identity, caller IP address, the action performed, and the target resource. Use **CallerIdentity** to correlate a change with the specific caller. Audit logs are only produced for write operations.
199
+
200
+
HTTP request logs are generated for both write and read operations. Due to the fact these logs are aggregated, some caller identity details may be lost as part of the aggregation process. HTTP request logs are best for understanding request patterns and performance characteristics such as user agent, request duration, and request volume. The **ClientObjectId**, **ClientTenantId**, and **AccessKeyId** fields provide caller context.
199
201
200
202
| Log type | Logged operations | Is aggregated |
201
203
|-------|-----|-----|
202
204
| Audit | Write | No |
203
205
| HTTP Requests | Read, Write | Yes |
204
206
205
-
Two authentication methods are supported, which are Extra ID and access key (HMAC/connection string). If you use Extra ID, you should see information about caller or client. If you use access key, you should see information related to access key. To enforce Extra ID authentication and remove access key usage for better security, see [disable access key authentication](/azure/azure-app-configuration/howto-disable-access-key-authentication?tabs=portal#disable-access-key-authentication).
207
+
App Configuration supports Microsoft Entra ID authentication and access key-based authentication. If you authenticate with an Extra ID, you can retrieve the client object ID and client tenant ID to identify the caller. If you authenticate with an access key, you can retrieve the access key ID to determine which key was used.
206
208
207
209
Following are sample queries for the **AACAudit** and **AACHttpRequest** tables that show caller identity information.
208
210
209
-
* Identify key-value modifications in audit logs in the last 7 days, extracting operation name, resource, the principal identifier (CallerIdentity), source IP address (CallerIPAddress):
211
+
* Identify key-value changes in the audit logs from the past seven days, extracting the operation name, target resource, caller identity, and caller IP address.
210
212
211
213
```Kusto
212
214
AACAudit
@@ -216,7 +218,7 @@ Following are sample queries for the **AACAudit** and **AACHttpRequest** tables
216
218
| sort by TimeGenerated desc
217
219
```
218
220
219
-
* Identify key-value writes and reads in HTTP request logs in the last 7 days, extracting method, resource, status code, client object ID, client tenant ID, access key ID, client IP address, user agent:
221
+
* Identify key‑value read and write operations in HTTP request logs from the past seven days, extracting the HTTP method, request URI, status code, client object ID, client tenant ID, access key ID, client IP address, user agent, and hit count.
220
222
221
223
```Kusto
222
224
AACHttpRequest
@@ -228,18 +230,18 @@ Following are sample queries for the **AACAudit** and **AACHttpRequest** tables
228
230
229
231
## Alerts
230
232
231
-
Azure Monitor alerts proactively notify you when important conditions are found in your monitoring data. They allow you to identify and address issues in your system before your customers notice them. You can set alerts on [metrics](/azure/azure-monitor/alerts/alerts-metric-overview), [logs](/azure/azure-monitor/alerts/alerts-unified-log), and the [activity log](/azure/azure-monitor/alerts/activity-log-alerts). Different types of alerts have benefits and drawbacks.
233
+
Azure Monitor alerts notify you when significant conditions appear in your monitoring data, helping you detect and resolve issues before they impact your service or applications. You can configure alerts based on [metrics](/azure/azure-monitor/alerts/alerts-types#metric-alerts), [logs](/azure/azure-monitor/alerts/alerts-types#log-alerts), and the [activity log](/azure/azure-monitor/alerts/alerts-types#activity-log-alerts). Each alert type offers distinct advantages and trade‑offs.
232
234
233
235
The following table lists common and recommended alert rules for App Configuration.
234
236
235
237
| Alert type | Condition | Description |
236
238
|:---|:---|:---|
237
-
|Request quota usage exceeded | RequestQuotaUsage >= 100 | The configuration store has exceeded the [request quota usage](./faq.yml#are-there-any-limits-on-the-number-of-requests-made-to-app-configuration). Upgrade your store or follow the [best practices](./howto-best-practices.md#reduce-requests-made-to-app-configuration) to optimize your usage. |
239
+
|Request quota usage| RequestQuotaUsage > 80 | The configuration store has consumed over 80% of the [request quota](./faq.yml#are-there-any-limits-on-the-number-of-requests-made-to-app-configuration). Upgrade your store or follow the [best practices](./howto-best-practices.md#reduce-requests-made-to-app-configuration) to optimize your usage. |
For details on the metrics schema, see [App Configuration Metrics](/azure/azure-monitor/reference/supported-metrics/microsoft-appconfiguration-configurationstores-metrics)
0 commit comments