Supported logs for microsoft.keyvault/managedhsms
The following table lists the types of logs available for the microsoft.keyvault/managedhsms resource type.
For a list of supported metrics, see Supported metrics - microsoft.keyvault/managedhsms
Category | Category display name | Log table | Supports basic log plan | Supports ingestion-time transformation | Example queries | Costs to export |
---|---|---|---|---|---|---|
AuditEvent |
Audit Event | AZKVAuditLogs Audit logs can be used to monitor how and when your key vaults are accessed, and by whom. Customers will be able to log all authentication api requests. Operations on the key vault itself, including creation, deletion, setting key vault access policies, and updating key vault attributes such as tags.Operation on keys and secrets in keyvault including creating, deleting, signing. |
Yes | No | Queries | No |