Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable resource-specific diagnostic logging for resources that support it #1911

Open
Greg-Court opened this issue Jan 21, 2025 · 1 comment
Assignees
Labels
Area: Policy 📝 Issues / PR's related to Policy

Comments

@Greg-Court
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

Is your feature request related to a problem?

Currently the policy "Enable category group resource logging for supported resources to Log Analytics" enables the allLogs diagnostic settings category for some resources to be sent to the LAW AzureDiagnostics table. This is the legacy option.

The newer, more user-friendly method is to to send Azure resource logs to multiple resource-specific tables for each category of the resource.

Describe the solution you'd like

For resources that support it, use Azure Policy to automatically configure the diagnostics settings to send logs to the newer Microsoft-recommended resource-specific tables.

Additional context

Using this new mode, multiple individual tables are provisioned in the selected workspace for each category selected in the diagnostic setting.

Microsoft recommends this method going forward because:

  • Simplified means to work with the data in log queries.
  • Provides improved discoverability of schemas and their structure.
  • Improves performance across ingestion latency and query times.
  • Provides the ability to grant Azure role-based access control rights on a specific table.
  • All Azure services will eventually migrate to the resource-specific mode!
@matt-FFFFFF
Copy link
Member

Hi this is a policy issue and so I'm routing it upstream

@matt-FFFFFF matt-FFFFFF transferred this issue from Azure/terraform-azurerm-caf-enterprise-scale Feb 3, 2025
@matt-FFFFFF matt-FFFFFF added the Area: Policy 📝 Issues / PR's related to Policy label Feb 3, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Area: Policy 📝 Issues / PR's related to Policy
Projects
None yet
Development

No branches or pull requests

3 participants