Skip to content

Commit 02ed29d

Browse files
committed
Copy edit
1 parent 3550d73 commit 02ed29d

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/virtual-wan/monitor-virtual-wan-reference.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Azure Virtual WAN logs and metrics using Azure Monitor.
44
author: cherylmc
55
ms.service: virtual-wan
66
ms.topic: reference
7-
ms.date: 06/08/2022
7+
ms.date: 02/15/2024
88
ms.author: cherylmc
99
ms.custom: subject-monitoring
1010

@@ -22,7 +22,7 @@ The following metric is available for virtual hub router within a virtual hub:
2222

2323
| Metric | Description|
2424
| --- | --- |
25-
| **Virtual Hub Data Processed** | Data on how much traffic traverses the virtual hub router in a given time period. Note that only the following flows use the virtual hub router: VNet to VNet (same hub and interhub) and VPN/ExpressRoute branch to VNet (interhub). If a virtual hub is secured with routing intent, then these flows will traverse the firewall instead of the hub router. |
25+
| **Virtual Hub Data Processed** | Data on how much traffic traverses the virtual hub router in a given time period. Only the following flows use the virtual hub router: VNet to VNet (same hub and interhub) and VPN/ExpressRoute branch to VNet (interhub). If a virtual hub is secured with routing intent, then these flows traverse the firewall instead of the hub router. |
2626

2727
#### PowerShell steps
2828

@@ -46,9 +46,9 @@ $MetricInformation.Data
4646

4747
* **Time Grain** - Refers to the frequency at which you want to see the aggregation. In the current command, you'll see a selected aggregated unit per 5 mins. You can select – 5M/15M/30M/1H/6H/12H and 1D.
4848

49-
* **Start Time and End Time** - This time is based on UTC, so please ensure that you're entering UTC values when inputting these parameters. If these parameters aren't used, the past one hour's worth of data is shown by default.
49+
* **Start Time and End Time** - This time is based on UTC. Ensure that you're entering UTC values when inputting these parameters. If these parameters aren't used, the past one hour's worth of data is shown by default.
5050

51-
* **Sum Aggregation Type** - This aggregation type will show you the total number of bytes that traversed the virtual hub router during a selected time period. The **Max** and **Min** aggregation types are not meaningful.
51+
* **Sum Aggregation Type** - This aggregation type shows you the total number of bytes that traversed the virtual hub router during a selected time period. The **Max** and **Min** aggregation types aren't meaningful.
5252

5353

5454
### <a name="s2s-metrics"></a>Site-to-site VPN gateway metrics
@@ -103,7 +103,7 @@ The following metrics are available for Virtual WAN point-to-site VPN gateways:
103103
| Metric | Description|
104104
| --- | --- |
105105
| **Gateway P2S Bandwidth** | Average point-to-site aggregate bandwidth of a gateway in bytes per second. |
106-
| **P2S Connection Count** |Point-to-site connection count of a gateway. To ensure you're viewing accurate Metrics in Azure Monitor, select the **Aggregation Type** for **P2S Connection Count** as **Sum**. You may also select **Max** if you split By **Instance**. |
106+
| **P2S Connection Count** |Point-to-site connection count of a gateway. To ensure you're viewing accurate Metrics in Azure Monitor, select the **Aggregation Type** for **P2S Connection Count** as **Sum**. You can also select **Max** if you split By **Instance**. |
107107
| **User VPN Routes Count** | Number of User VPN Routes configured on the VPN gateway. This metric can be broken down into **Static** and **Dynamic** Routes.
108108

109109
### <a name="er-metrics"></a>Azure ExpressRoute gateway metrics
@@ -132,7 +132,7 @@ The following diagnostics are available for Virtual WAN site-to-site VPN gateway
132132
| Metric | Description|
133133
| --- | --- |
134134
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and additional diagnostics.|
135-
| **Tunnel Diagnostic Logs** | These are IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and additional diagnostics. For connect and disconnect events, these logs will also display the remote IP address of the corresponding on-premises VPN device.|
135+
| **Tunnel Diagnostic Logs** | These are IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and additional diagnostics. For connect and disconnect events, these logs also display the remote IP address of the corresponding on-premises VPN device.|
136136
| **Route Diagnostic Logs** | These are logs related to events for static routes, BGP, route updates, and additional diagnostics. |
137137
| **IKE Diagnostic Logs** | IKE-specific diagnostics for IPsec connections. |
138138

@@ -152,13 +152,13 @@ In Azure Virtual WAN, ExpressRoute gateway metrics can be exported as logs via a
152152

153153
### Log Analytics sample query
154154

155-
If you selected to send diagnostic data to a Log Analytics Workspace, then you can use SQL-like queries such as the example below to examine the data. For more information, see [Log Analytics Query Language](/services-hub/health/log-analytics-query-language).
155+
If you selected to send diagnostic data to a Log Analytics Workspace, then you can use SQL-like queries, such as the following example, to examine the data. For more information, see [Log Analytics Query Language](/services-hub/health/log-analytics-query-language).
156156

157157
The following example contains a query to obtain site-to-site route diagnostics.
158158

159159
`AzureDiagnostics | where Category == "RouteDiagnosticLog"`
160160

161-
Replace the values below, after the **= =**, as needed based on the tables reported in the previous section of this article.
161+
Replace the following values, after the **= =**, as needed based on the tables reported in the previous section of this article.
162162

163163
* "GatewayDiagnosticLog"
164164
* "IKEDiagnosticLog"
@@ -170,7 +170,7 @@ In order to execute the query, you have to open the Log Analytics resource you c
170170

171171
:::image type="content" source="./media/monitor-virtual-wan-reference/log-analytics-query-samples.png" alt-text="Screenshot of Log Analytics Query samples." lightbox="./media/monitor-virtual-wan-reference/log-analytics-query-samples.png":::
172172

173-
For Azure Firewall, a [workbook](../firewall/firewall-workbook.md) is provided to make log analysis easier. Using its graphical interface, it will be possible to investigate the diagnostic data without manually writing any Log Analytics query.
173+
For Azure Firewall, a [workbook](../firewall/firewall-workbook.md) is provided to make log analysis easier. Using its graphical interface, you can investigate the diagnostic data without manually writing any Log Analytics query.
174174

175175
## <a name="activity-logs"></a>Activity logs
176176

@@ -184,7 +184,7 @@ For more information on the schema of Activity Log entries, see [Activity Log sc
184184

185185
For detailed description of the top-level diagnostic logs schema, see [Supported services, schemas, and categories for Azure Diagnostic Logs](../azure-monitor/essentials/resource-logs-schema.md).
186186

187-
When reviewing any metrics through Log Analytics, the output will contain the following columns:
187+
When reviewing any metrics through Log Analytics, the output contains the following columns:
188188

189189
|**Column**|**Type**|**Description**|
190190
| --- | --- | --- |
@@ -197,7 +197,7 @@ When reviewing any metrics through Log Analytics, the output will contain the fo
197197

198198
## <a name="azure-firewall"></a>Monitoring secured hub (Azure Firewall)
199199

200-
If you have chosen to secure your virtual hub using Azure Firewall, relevant logs and metrics are available here: [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
200+
If you chose to secure your virtual hub using Azure Firewall, relevant logs and metrics are available here: [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
201201
You can monitor the Secured Hub using Azure Firewall logs and metrics. You can also use activity logs to audit operations on Azure Firewall resources.
202202
For every Azure Virtual WAN you secure and convert to a Secured Hub, an explicit firewall resource object is created in the resource group where the hub is located.
203203

@@ -207,5 +207,5 @@ For every Azure Virtual WAN you secure and convert to a Secured Hub, an explicit
207207
## Next steps
208208

209209
* To learn how to monitor Azure Firewall logs and metrics, see [Tutorial: Monitor Azure Firewall logs](../firewall/firewall-diagnostics.md).
210-
* For additional information about Virtual WAN monitoring, see [Monitoring Azure Virtual WAN](monitor-virtual-wan.md).
210+
* For more information about Virtual WAN monitoring, see [Monitoring Azure Virtual WAN](monitor-virtual-wan.md).
211211
* To learn more about metrics in Azure Monitor, see [Metrics in Azure Monitor](../azure-monitor/essentials/data-platform-metrics.md).

0 commit comments

Comments
 (0)