As part of your industrial IoT solution, you have 10 wind turbines equipped with several sensors.
All of these sensors send thousands of telemetry data to an IoT hub.
You have built a solution that provides real-time visibility, on-the-fly analysis of key data for the operations.
For troubleshooting and further analysis, you are told that you can use the Connections and Device telemetry logs collected and sent to Log Analytics automatically by Azure Monitor.
Is that sufficient to solve the problem?
Click on the arrows to vote for the correct answer
A. B.Correct Answer: B.
Option A is incorrect because, to make resource log data available for later use, a diagnostic setting must be configured in the IoT Hub for redirecting data into one of the three destinations: Log Analytics, Event hubs, Storage account.
No automatic log collection takes place.
Option B is CORRECT because, by default, resource logs are not collected.
Resource logs (like Connections and Device telemetry) are generated automatically by Azure resources (like IoT Hub), but for them to be collected, you also need to configure a diagnostic setting in IoT Hub.
Diagram:
References:
The provided information suggests that an IoT solution has been developed that enables real-time visibility and on-the-fly analysis of telemetry data from 10 wind turbines equipped with sensors. Additionally, the solution sends the collected data to an IoT hub. However, for troubleshooting and further analysis, it is suggested to use the Connections and Device telemetry logs collected and sent to Log Analytics automatically by Azure Monitor.
Given the information provided, it appears that the solution may be sufficient for solving the problem, but it is difficult to provide a definitive answer without additional information.
Using Connections and Device telemetry logs collected and sent to Log Analytics can provide additional insights into device connectivity and data ingestion. However, this may not be enough for a complete solution, depending on the nature and complexity of the problem.
Therefore, to determine if the solution is sufficient, it is necessary to consider the specifics of the problem being addressed and evaluate if the available data and analytics capabilities are adequate.
Additionally, it is important to consider the performance and scalability of the solution in terms of handling large volumes of data from multiple devices, as well as the security and privacy requirements for handling sensitive data.
In conclusion, while the available information suggests that the solution may be sufficient for solving the problem, a more thorough evaluation is necessary to determine its effectiveness and adequacy.