Bilješka
Pristup ovoj stranici zahtijeva provjeru vjerodostojnosti. Možete pokušati da se prijavite ili promijenite direktorije.
Pristup ovoj stranici zahtijeva provjeru vjerodostojnosti. Možete pokušati promijeniti direktorije.
The following table lists the types of logs available for the Microsoft.Network/networkSecurityPerimeters resource type.
Category | Category display name | Log table | Supports basic log plan | Supports ingestion-time transformation | Example queries | Costs to export |
---|---|---|---|---|---|---|
NspCrossPerimeterInboundAllowed |
Cross perimeter inbound access allowed by perimeter link. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspCrossPerimeterOutboundAllowed |
Cross perimeter outbound access allowed by perimeter link. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspIntraPerimeterInboundAllowed |
Inbound access allowed within same perimeter. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspOutboundAttempt |
Outbound attempted to same or different perimeter. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPrivateInboundAllowed |
Private endpoint traffic allowed. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicInboundPerimeterRulesAllowed |
Public inbound access allowed by NSP access rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicInboundPerimeterRulesDenied |
Public inbound access denied by NSP access rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicInboundResourceRulesAllowed |
Public inbound access allowed by PaaS resource rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicInboundResourceRulesDenied |
Public inbound access denied by PaaS resource rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicOutboundPerimeterRulesAllowed |
Public outbound access allowed by NSP access rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicOutboundPerimeterRulesDenied |
Public outbound access denied by NSP access rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicOutboundResourceRulesAllowed |
Public outbound access allowed by PaaS resource rules. | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes | |
NspPublicOutboundResourceRulesDenied |
Public outbound access denied by PaaS resource rules | NSPAccessLogs Logs of Network Security Perimeter (NSP) inbound access allowed based on NSP access rules. |
Yes | No | Yes |
Next Steps
- Learn more about resource logs
- Stream resource logs to Event Hubs
- Change resource log diagnostic settings using the Azure Monitor REST API
- Analyze logs from Azure storage with Log Analytics
- Optimize log queries in Azure Monitor
- Aggregate data in a Log Analytics workspace by using summary rules (Preview)