संपादित करें

इसके माध्यम से साझा किया गया


Supported logs for microsoft.keyvault/managedhsms

The following table lists the types of logs available for the microsoft.keyvault/managedhsms resource type.

For a list of supported metrics, see Supported metrics - microsoft.keyvault/managedhsms

Category Category display name Log table Supports basic log plan Supports ingestion-time transformation Example queries Costs to export
AuditEvent Audit Event AZKVAuditLogs

Audit logs can be used to monitor how and when your key vaults are accessed, and by whom. Customers will be able to log all authentication api requests. Operations on the key vault itself, including creation, deletion, setting key vault access policies, and updating key vault attributes such as tags.Operation on keys and secrets in keyvault including creating, deleting, signing.

Yes No Queries No