Skip to content

Commit 03d1078

Browse files
Fixes to metrics tables. Misc.
1 parent 926ff01 commit 03d1078

File tree

2 files changed

+25
-20
lines changed

2 files changed

+25
-20
lines changed

articles/virtual-wan/monitor-virtual-wan-reference.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,8 @@ The following table lists the metrics available for the microsoft.network/p2svpn
9393

9494
[!INCLUDE [microsoft.network/p2svpngateways](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/metrics/microsoft-network-p2svpngateways-metrics-include.md)]
9595

96+
This table contains more information about some of the metrics in the preceding table.
97+
9698
| Metric | Description |
9799
|:-------|:------------|
98100
| **Gateway P2S Bandwidth** | Average point-to-site aggregate bandwidth of a gateway in bytes per second. |
@@ -107,6 +109,8 @@ The following table lists the metrics available for the microsoft.network/expres
107109

108110
[!INCLUDE [microsoft.network/expressroutegateways](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/metrics/microsoft-network-expressroutegateways-metrics-include.md)]
109111

112+
This table contains more information about some of the metrics in the preceding table.
113+
110114
| Metric | Description |
111115
|:-------|:------------|
112116
| **BitsInPerSecond** | Bits per second ingressing Azure via ExpressRoute that can be further split for specific connections. |
@@ -162,10 +166,10 @@ microsoft.network/expressroutegateways
162166

163167
[!INCLUDE [microsoft.network/p2svpngateways](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/logs/microsoft-network-p2svpngateways-logs-include.md)]
164168

165-
The following diagnostics are available for Virtual WAN point-to-site VPN gateways:
169+
This table contains more information about the preceding table.
166170

167-
| Metric | Description|
168-
| --- | --- |
171+
| Metric | Description |
172+
|:-------|:------------|
169173
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and other diagnostics. |
170174
| **IKE Diagnostic Logs** | IKE-specific diagnostics for IPsec connections.|
171175
| **P2S Diagnostic Logs** | These events are User VPN P2S (Point-to-site) configuration and client events. They include client connect/disconnect, VPN client address allocation, and other diagnostics.|
@@ -174,15 +178,15 @@ The following diagnostics are available for Virtual WAN point-to-site VPN gatewa
174178

175179
[!INCLUDE [microsoft.network/vpngateways](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/logs/microsoft-network-vpngateways-logs-include.md)]
176180

177-
| Metric | Description|
178-
| --- | --- |
179-
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and other diagnostics.|
180-
| **Tunnel Diagnostic Logs** | IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and other diagnostics. For connect and disconnect events, these logs also display the remote IP address of the corresponding on-premises VPN device.|
181+
This table contains more information about the preceding table.
182+
183+
| Metric | Description |
184+
|:-------|:------------|
185+
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and other diagnostics. |
186+
| **Tunnel Diagnostic Logs** | IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and other diagnostics. For connect and disconnect events, these logs also display the remote IP address of the corresponding on-premises VPN device. |
181187
| **Route Diagnostic Logs** | Logs related to events for static routes, BGP, route updates, and other diagnostics. |
182188
| **IKE Diagnostic Logs** | IKE-specific diagnostics for IPsec connections. |
183189

184-
185-
186190
[!INCLUDE [horz-monitor-ref-logs-tables](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-logs-tables.md)]
187191

188192
### Virtual WAN Microsoft.Network/vpnGateways

articles/virtual-wan/monitor-virtual-wan.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -98,15 +98,15 @@ The following example contains a query to obtain site-to-site route diagnostics.
9898

9999
`AzureDiagnostics | where Category == "RouteDiagnosticLog"`
100100

101-
Replace the following values, after the **= =**, as needed based on the tables reported in the previous section of this article.
101+
Replace the following values, after the `==`, as needed based on the tables reported in the previous section of this article.
102102

103-
- "GatewayDiagnosticLog"
104-
- "IKEDiagnosticLog"
105-
- "P2SDiagnosticLog
106-
- "TunnelDiagnosticLog"
107-
- "RouteDiagnosticLog"
103+
- GatewayDiagnosticLog
104+
- IKEDiagnosticLog
105+
- P2SDiagnosticLog
106+
- TunnelDiagnosticLog
107+
- RouteDiagnosticLog
108108

109-
In order to execute the query, you have to open the Log Analytics resource you configured to receive the diagnostic logs, and then select **Logs** under the **General** tab on the left side of the pane:
109+
In order to run the query, you have to open the Log Analytics resource you configured to receive the diagnostic logs, and then select **Logs** under the **General** tab on the left side of the pane:
110110

111111
:::image type="content" source="./media/monitor-virtual-wan-reference/log-analytics-query-samples.png" alt-text="Screenshot of Log Analytics Query samples." lightbox="./media/monitor-virtual-wan-reference/log-analytics-query-samples.png":::
112112

@@ -130,20 +130,21 @@ The following steps help you create, edit, and view diagnostic settings:
130130

131131
1. In this page, you can create a new diagnostic setting (**+Add diagnostic setting**) or edit an existing one (**Edit setting**). You can choose to send the diagnostic logs to Log Analytics (as shown in the following example), stream to an event hub, send to a 3rd-party solution, or archive to a storage account.
132132

133-
:::image type="content" source="./media/monitor-virtual-wan-reference/select-gateway-settings.png" alt-text="Screenshot for Select Diagnostic Log settings." lightbox="./media/monitor-virtual-wan-reference/select-gateway-settings.png":::
133+
:::image type="content" source="./media/monitor-virtual-wan-reference/select-gateway-settings.png" alt-text="Screenshot for Select Diagnostic Log settings." lightbox="./media/monitor-virtual-wan-reference/select-gateway-settings.png":::
134+
134135
1. After clicking **Save**, you should start seeing logs appear in this log analytics workspace within a few hours.
135136
1. To monitor a **secured hub (with Azure Firewall)**, then diagnostics and logging configuration must be done from accessing the **Diagnostic Setting** tab:
136137

137-
:::image type="content" source="./media/monitor-virtual-wan-reference/firewall-diagnostic-settings.png" alt-text="Screenshot shows Firewall diagnostic settings." lightbox="./media/monitor-virtual-wan-reference/firewall-diagnostic-settings.png" :::
138+
:::image type="content" source="./media/monitor-virtual-wan-reference/firewall-diagnostic-settings.png" alt-text="Screenshot shows Firewall diagnostic settings." lightbox="./media/monitor-virtual-wan-reference/firewall-diagnostic-settings.png" :::
138139

139140
> [!IMPORTANT]
140141
> Enabling these settings requires additional Azure services (storage account, event hub, or Log Analytics), which may increase your cost. To calculate an estimated cost, visit the [Azure pricing calculator](https://azure.microsoft.com/pricing/calculator).
141142
142143
## <a name="azure-firewall"></a>Monitoring secured hub (Azure Firewall)
143144

144145
If you chose to secure your virtual hub using Azure Firewall, relevant logs and metrics are available here: [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
145-
You can monitor the Secured Hub using Azure Firewall logs and metrics. You can also use activity logs to audit operations on Azure Firewall resources.
146-
For every Azure Virtual WAN you secure and convert to a Secured Hub, Azure Firewall creates an explicit firewall resource object. The object is in the resource group where the hub is located.
146+
147+
You can monitor the Secured Hub using Azure Firewall logs and metrics. You can also use activity logs to audit operations on Azure Firewall resources. For every Azure Virtual WAN you secure and convert to a Secured Hub, Azure Firewall creates an explicit firewall resource object. The object is in the resource group where the hub is located.
147148

148149
:::image type="content" source="./media/monitor-virtual-wan-reference/firewall-resources-portal.png" alt-text="Screenshot shows a Firewall resource in the vWAN hub resource group." lightbox="./media/monitor-virtual-wan-reference/firewall-resources-portal.png":::
149150

0 commit comments

Comments
 (0)