diff --git a/CHANGELOG.next.asciidoc b/CHANGELOG.next.asciidoc index 70aa6d864ce8..773a206ecbe6 100644 --- a/CHANGELOG.next.asciidoc +++ b/CHANGELOG.next.asciidoc @@ -299,6 +299,7 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d - Fix s3 input when there is a blank line in the log file. {pull}25357[25357] - Fixes the Snyk module to work with the new API changes. {pull}27358[27358] - Fixes a bug in `http_endpoint` that caused numbers encoded as strings. {issue}27382[27382] {pull}27480[27480] +- Update indentation for azure filebeat configuration. {pull}26604[26604] *Heartbeat* diff --git a/filebeat/docs/modules/azure.asciidoc b/filebeat/docs/modules/azure.asciidoc index e76362061159..003494994355 100644 --- a/filebeat/docs/modules/azure.asciidoc +++ b/filebeat/docs/modules/azure.asciidoc @@ -47,35 +47,35 @@ Will retrieve azure Active Directory audit logs. The audit logs provide traceabi storage_account_key: "" resource_manager_endpoint: "" - platformlogs: - enabled: false - var: - eventhub: "" - consumer_group: "$Default" - connection_string: "" - storage_account: "" - storage_account_key: "" - resource_manager_endpoint: "" - - auditlogs: - enabled: false - var: - eventhub: "insights-logs-auditlogs" - consumer_group: "$Default" - connection_string: "" - storage_account: "" - storage_account_key: "" - resource_manager_endpoint: "" - - signinlogs: - enabled: false - var: - eventhub: "insights-logs-signinlogs" - consumer_group: "$Default" - connection_string: "" - storage_account: "" - storage_account_key: "" - resource_manager_endpoint: "" + platformlogs: + enabled: false + var: + eventhub: "" + consumer_group: "$Default" + connection_string: "" + storage_account: "" + storage_account_key: "" + resource_manager_endpoint: "" + + auditlogs: + enabled: false + var: + eventhub: "insights-logs-auditlogs" + consumer_group: "$Default" + connection_string: "" + storage_account: "" + storage_account_key: "" + resource_manager_endpoint: "" + + signinlogs: + enabled: false + var: + eventhub: "insights-logs-signinlogs" + consumer_group: "$Default" + connection_string: "" + storage_account: "" + storage_account_key: "" + resource_manager_endpoint: "" ---- diff --git a/x-pack/filebeat/module/azure/_meta/docs.asciidoc b/x-pack/filebeat/module/azure/_meta/docs.asciidoc index 727349ac9c74..b38644dab0a8 100644 --- a/x-pack/filebeat/module/azure/_meta/docs.asciidoc +++ b/x-pack/filebeat/module/azure/_meta/docs.asciidoc @@ -42,35 +42,35 @@ Will retrieve azure Active Directory audit logs. The audit logs provide traceabi storage_account_key: "" resource_manager_endpoint: "" - platformlogs: - enabled: false - var: - eventhub: "" - consumer_group: "$Default" - connection_string: "" - storage_account: "" - storage_account_key: "" - resource_manager_endpoint: "" - - auditlogs: - enabled: false - var: - eventhub: "insights-logs-auditlogs" - consumer_group: "$Default" - connection_string: "" - storage_account: "" - storage_account_key: "" - resource_manager_endpoint: "" - - signinlogs: - enabled: false - var: - eventhub: "insights-logs-signinlogs" - consumer_group: "$Default" - connection_string: "" - storage_account: "" - storage_account_key: "" - resource_manager_endpoint: "" + platformlogs: + enabled: false + var: + eventhub: "" + consumer_group: "$Default" + connection_string: "" + storage_account: "" + storage_account_key: "" + resource_manager_endpoint: "" + + auditlogs: + enabled: false + var: + eventhub: "insights-logs-auditlogs" + consumer_group: "$Default" + connection_string: "" + storage_account: "" + storage_account_key: "" + resource_manager_endpoint: "" + + signinlogs: + enabled: false + var: + eventhub: "insights-logs-signinlogs" + consumer_group: "$Default" + connection_string: "" + storage_account: "" + storage_account_key: "" + resource_manager_endpoint: "" ----