Skip to content

Commit 0032b2d

Browse files
Merge pull request #263732 from siddomala/RHCvirtualhub
RHC for Virtual WAN
2 parents 493a654 + acb666b commit 0032b2d

File tree

3 files changed

+23
-0
lines changed

3 files changed

+23
-0
lines changed

articles/service-health/resource-health-checks-resource-types.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -195,6 +195,11 @@ Below is a complete list of all the checks executed through resource health by r
195195
|---|
196196
| - Is the ExpressRoute circuit healthy?|
197197

198+
## Microsoft.Network/expressRouteGateways (ExpressRoute Gateways in Virtual WAN)
199+
|Executed Checks|
200+
|---|
201+
| - Is the ExpressRoute Gateway up and running?|
202+
198203
## Microsoft.network/frontdoors
199204
|Executed Checks|
200205
|---|
@@ -216,6 +221,11 @@ Below is a complete list of all the checks executed through resource health by r
216221
|---|
217222
| - Are there any issues impacting the Traffic Manager profile?|
218223

224+
## Microsoft.Network/virtualHubs
225+
|Executed Checks|
226+
|---|
227+
| - Is the virtual hub router up and running?|
228+
219229
## Microsoft.network/virtualNetworkGateways
220230
|Executed Checks|
221231
|---|

articles/virtual-wan/monitoring-best-practices.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -122,6 +122,16 @@ This section of the article focuses on metric-based alerts. Azure Firewall offer
122122
|Create alert rule for risk of SNAT port exhaustion.|Azure Firewall provides 2,496 SNAT ports per public IP address configured per backend virtual machine scale instance. It’s important to estimate in advance the number of SNAT ports that will fulfill your organizational requirements for outbound traffic to the Internet. Not doing so increases the risk of exhausting the number of available SNAT ports on the Azure Firewall, potentially causing outbound connectivity failures.<br><br>Use the **SNAT port utilization** metric to monitor the percentage of outbound SNAT ports currently in use. Create an alert rule for this metric to be triggered whenever this percentage surpasses **95%** (due to an unforeseen traffic increase, for example) so you can act accordingly by configuring an additional public IP address on the Azure Firewall, or by using an [Azure NAT Gateway](../nat-gateway/nat-overview.md) instead. Use the **Maximum** aggregation type when configuring the alert rule.<br><br>To learn more about how to interpret the **SNAT port utilization** metric, see [Overview of Azure Firewall logs and metrics](../firewall/logs-and-metrics.md#metrics). To learn more about how to scale SNAT ports in Azure Firewall, see [Scale SNAT ports with Azure NAT Gateway](../firewall/integrate-with-nat-gateway.md).|
123123
|Create alert rule for firewall overutilization.|Azure Firewall maximum throughput differs depending on the SKU and features enabled. To learn more about Azure Firewall performance, see [Azure Firewall performance](../firewall/firewall-performance.md).<br><br>You might want to be alerted if your firewall is nearing its maximum throughput and troubleshoot the underlying cause, as this can have an impact in the firewall’s performance.<br><br> Create an alert rule to be triggered whenever the **Throughput** metric surpasses a value nearing the firewall’s maximum throughput – if the maximum throughput is 30Gbps, configure 25Gbps as the **Threshold** value, for example. The **Throughput** metric unit is **bits/sec**. Choose the **Average** aggregation type when creating the alert rule.
124124

125+
## Resource Health Alerts
126+
127+
You can also configure [Resource Health Alerts](../service-health/resource-health-alert-monitor-guide.md) via Service Health for the below resources. This ensures you are informed of the availability of your Virtual WAN environment, and this allows you to troubleshoot if networking issues are due to your Azure resources entering an unhealthy state, as opposed to issues from your on-premises environment. It is recommended to configure alerts when the resource status becomes degraded or unavailable. If the resource status does become degraded/unavailable, you can analyze if there are any recent spikes in the amount of traffic processed by these resources, the routes advertised to these resources, or the number of branch/VNet connections created. Please see [Azure Virtual WAN limits](../azure-resource-manager/management/azure-subscription-service-limits.md#virtual-wan-limits) for additional info on limits supported in Virtual WAN.
128+
129+
* Microsoft.Network/vpnGateways
130+
* Microsoft.Network/expressRouteGateways
131+
* Microsoft.Network/azureFirewalls
132+
* Microsoft.Network/virtualHubs
133+
* Microsoft.Network/p2sVpnGateways
134+
125135
## Next steps
126136

127137
* See [Monitoring Virtual WAN data reference](monitor-virtual-wan-reference.md) for a data reference of the metrics, logs, and other important values created by Virtual WAN.

includes/virtual-wan-limits.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,3 +19,6 @@
1919
| VNet connections per hub | 500 minus total number of hubs in Virtual WAN |
2020
| Aggregate throughput per Virtual WAN hub router | 50 Gbps for VNet to VNet transit |
2121
| VM workload across all VNets connected to a single Virtual WAN hub | 2000 (If you want to raise the limit or quota above the default limit, see [hub settings](../articles/virtual-wan/hub-settings.md)). |
22+
| Total number of routes the hub can accept from its connected resources (virtual networks, branches, other virtual hubs, etc.) | 10,000 |
23+
24+

0 commit comments

Comments
 (0)