Skip to content

Commit 1248f3d

Browse files
authored
Merge pull request #125833 from changeworld/patch-46
Fix typo
2 parents 078be9e + 7b23d9c commit 1248f3d

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/network-watcher/network-watcher-nsg-grafana.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,11 @@ ms.custom: linux-related-content
1616

1717
[Network Security Group (NSG) flow logs](nsg-flow-logs-overview.md) provide information that can be used to understand ingress and egress IP traffic on network interfaces. These flow logs show outbound and inbound flows on a per NSG rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
1818

19-
You can have many NSGs in your network with flow logging enabled. This amount of logging data makes it cumbersome to parse and gain insights from your logs. This article provides a solution to centrally manage these NSG flow logs using Grafana, an open source graphing tool, ElasticSearch, a distributed search and analytics engine, and Logstash, which is an open source server-side data processing pipeline.
19+
You can have many NSGs in your network with flow logging enabled. This amount of logging data makes it cumbersome to parse and gain insights from your logs. This article provides a solution to centrally manage these NSG flow logs using Grafana, an open source graphing tool, Elasticsearch, a distributed search and analytics engine, and Logstash, which is an open source server-side data processing pipeline.
2020

2121
## Scenario
2222

23-
NSG flow logs are enabled using Network Watcher and are stored in Azure blob storage. A Logstash plugin is used to connect and process flow logs from blob storage and send them to ElasticSearch. Once the flow logs are stored in ElasticSearch, they can be analyzed and visualized into customized dashboards in Grafana.
23+
NSG flow logs are enabled using Network Watcher and are stored in Azure blob storage. A Logstash plugin is used to connect and process flow logs from blob storage and send them to Elasticsearch. Once the flow logs are stored in Elasticsearch, they can be analyzed and visualized into customized dashboards in Grafana.
2424

2525
![NSG Network Watcher Grafana](./media/network-watcher-nsg-grafana/network-watcher-nsg-grafana-fig1.png)
2626

@@ -32,7 +32,7 @@ For this scenario, you must have Network Security Group Flow Logging enabled on
3232

3333
### Setup considerations
3434

35-
In this example Grafana, ElasticSearch, and Logstash are configured on an Ubuntu LTS Server deployed in Azure. This minimal setup is used for running all three components - they are all running on the same VM. This setup should only be used for testing and non-critical workloads. Logstash, Elasticsearch, and Grafana can all be architected to scale independently across many instances. For more information, see the documentation for each of these components.
35+
In this example Grafana, Elasticsearch, and Logstash are configured on an Ubuntu LTS Server deployed in Azure. This minimal setup is used for running all three components - they are all running on the same VM. This setup should only be used for testing and non-critical workloads. Logstash, Elasticsearch, and Grafana can all be architected to scale independently across many instances. For more information, see the documentation for each of these components.
3636

3737
### Install Logstash
3838

@@ -47,7 +47,7 @@ The following instructions are used to install Logstash in Ubuntu. For instructi
4747
sudo dpkg -i logstash-5.2.0.deb
4848
```
4949

50-
2. Configure Logstash to parse the flow logs and send them to ElasticSearch. Create a Logstash.conf file using:
50+
2. Configure Logstash to parse the flow logs and send them to Elasticsearch. Create a Logstash.conf file using:
5151

5252
```bash
5353
sudo touch /etc/logstash/conf.d/logstash.conf
@@ -137,7 +137,7 @@ The input section designates the input source of the logs that Logstash will pro
137137
138138
The filter section then flattens each flow log file so that each individual flow tuple and its associated properties becomes a separate Logstash event.
139139
140-
Finally, the output section forwards each Logstash event to the ElasticSearch server. Feel free to modify the Logstash config file to suit your specific needs.
140+
Finally, the output section forwards each Logstash event to the Elasticsearch server. Feel free to modify the Logstash config file to suit your specific needs.
141141
142142
### Install the Logstash input plugin for Azure Blob storage
143143
@@ -149,9 +149,9 @@ sudo /usr/share/logstash/bin/logstash-plugin install logstash-input-azureblob
149149
150150
For more information about this plug in, see [Logstash input plugin for Azure Storage Blobs](https://github.com/Azure/azure-diagnostics-tools/tree/master/Logstash/logstash-input-azureblob).
151151
152-
### Install ElasticSearch
152+
### Install Elasticsearch
153153
154-
You can use the following script to install ElasticSearch. For information about installing ElasticSearch, see [Elastic Stack](https://www.elastic.co/guide/en/elastic-stack/current/index.html).
154+
You can use the following script to install Elasticsearch. For information about installing Elasticsearch, see [Elastic Stack](https://www.elastic.co/guide/en/elastic-stack/current/index.html).
155155
156156
```bash
157157
sudo apt-get install apt-transport-https openjdk-8-jre-headless uuid-runtime pwgen -y
@@ -177,21 +177,21 @@ sudo service grafana-server start
177177
178178
For additional installation information, see [Installing on Debian / Ubuntu](https://docs.grafana.org/installation/debian/).
179179
180-
#### Add the ElasticSearch server as a data source
180+
#### Add the Elasticsearch server as a data source
181181
182-
Next, you need to add the ElasticSearch index containing flow logs as a data source. You can add a data source by selecting **Add data source** and completing the form with the relevant information. A sample of this configuration can be found in the following screenshot:
182+
Next, you need to add the Elasticsearch index containing flow logs as a data source. You can add a data source by selecting **Add data source** and completing the form with the relevant information. A sample of this configuration can be found in the following screenshot:
183183
184184
![Add data source](./media/network-watcher-nsg-grafana/network-watcher-nsg-grafana-fig2.png)
185185
186186
#### Create a dashboard
187187
188-
Now that you have successfully configured Grafana to read from the ElasticSearch index containing NSG flow logs, you can create and personalize dashboards. To create a new dashboard, select **Create your first dashboard**. The following sample graph configuration shows flows segmented by NSG rule:
188+
Now that you have successfully configured Grafana to read from the Elasticsearch index containing NSG flow logs, you can create and personalize dashboards. To create a new dashboard, select **Create your first dashboard**. The following sample graph configuration shows flows segmented by NSG rule:
189189
190190
![Dashboard graph](./media/network-watcher-nsg-grafana/network-watcher-nsg-grafana-fig3.png)
191191
192192
## Conclusion
193193
194-
By integrating Network Watcher with ElasticSearch and Grafana, you now have a convenient and centralized way to manage and visualize NSG flow logs as well as other data. Grafana has a number of other powerful graphing features that can also be used to further manage flow logs and better understand your network traffic. Now that you have a Grafana instance set up and connected to Azure, feel free to continue to explore the other functionality that it offers.
194+
By integrating Network Watcher with Elasticsearch and Grafana, you now have a convenient and centralized way to manage and visualize NSG flow logs as well as other data. Grafana has a number of other powerful graphing features that can also be used to further manage flow logs and better understand your network traffic. Now that you have a Grafana instance set up and connected to Azure, feel free to continue to explore the other functionality that it offers.
195195
196196
## Next step
197197

0 commit comments

Comments
 (0)