Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Advanced clusters
  3. Setting up Amazon Web Services
  4. Setting up Google Cloud
  5. Setting up Microsoft Azure
  6. Setting up a self-service cluster
  7. Local cluster setup
  8. Advanced configurations
  9. Troubleshooting advanced clusters
  10. Appendix A: Command reference

Advanced Clusters

Advanced Clusters

Polling logs

Polling logs

When you use Monitor, the Secure Agent accesses the log location to poll logs.
To poll logs from the log location, the Secure Agent uses the permissions in the managed identity that is assigned to the Secure Agent machine.

0 COMMENTS

We’d like to hear from you!