Skip to content

Commit 168e260

Browse files
Merge pull request #287446 from halkazwini/nw-nsgflow2
NSG flow logs retirement note
2 parents 7b68028 + 59f9418 commit 168e260

7 files changed

+25
-11
lines changed

articles/network-watcher/flow-logs-read.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,16 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: how-to
9-
ms.date: 04/24/2024
9+
ms.date: 09/26/2024
1010
ms.custom: devx-track-azurepowershell
1111

1212
#CustomerIntent: As an Azure administrator, I want to read my flow logs using a PowerShell script so I can see the latest data.
1313
---
1414

1515
# Read flow logs
1616

17+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
18+
1719
In this article, you learn how to selectively read portions of Azure Network Watcher flow logs using PowerShell without having to parse the entire log. Flow logs are stored in a storage account in block blobs. Each log is a separate block blob that is generated every hour and updated with the latest data every few minutes. Using the script provided in this article, you can read the latest data from the flow logs without having to download the entire log.
1820

1921
The concepts discussed in this article aren't limited to the PowerShell and are applicable to all languages supported by the Azure Storage APIs.

articles/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,17 @@
22
title: Analyze Azure network security group flow logs - Graylog
33
description: Learn how to manage and analyze network security group flow logs in Azure using Network Watcher and Graylog.
44
author: halkazwini
5+
ms.author: halkazwini
56
ms.service: azure-network-watcher
67
ms.topic: how-to
7-
ms.date: 05/31/2024
8-
ms.author: halkazwini
8+
ms.date: 09/26/2024
99
ms.custom: linux-related-content
1010
---
1111

1212
# Manage and analyze network security group flow logs in Azure using Network Watcher and Graylog
1313

14+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
15+
1416
[Network security group flow logs](nsg-flow-logs-overview.md) provide information that you can use to understand ingress and egress IP traffic for Azure network interfaces. Flow logs show outbound and inbound flows on a per network security group rule basis, the network interface the flow applies to, 5-tuple information (Source/Destination IP, Source/Destination Port, Protocol) about the flow, and if the traffic was allowed or denied.
1517

1618
You can have many network security groups in your network with flow logging enabled. Several network security groups with flow logging enabled can make it cumbersome to parse and gain insights from your logs. This article provides a solution to centrally manage these network security group flow logs using Graylog, an open source log management and analysis tool, and Logstash, an open source server-side data processing pipeline.

articles/network-watcher/network-watcher-delete-nsg-flow-log-blobs.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,17 @@
22
title: Delete storage blobs for network security group flow logs in Azure Network Watcher
33
description: This article explains how to delete the network security group flow log storage blobs that are outside their retention policy period in Azure Network Watcher.
44
author: halkazwini
5+
ms.author: halkazwini
56
ms.service: azure-network-watcher
67
ms.topic: how-to
7-
ms.date: 01/07/2021
8-
ms.author: halkazwini
8+
ms.date: 09/26/2024
99
ms.custom: devx-track-azurepowershell
1010
---
1111

1212
# Delete network security group flow log storage blobs in Network Watcher
1313

14+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
15+
1416
In case you ever need to manually delete flow logs from your storage account, you can use the PowerShell script below.
1517
This script only deletes storage blobs that are older than the existing retention policy specified by the user.
1618

articles/network-watcher/network-watcher-nsg-grafana.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,17 @@ title: Manage NSG Flow Logs using Grafana
33
titleSuffix: Azure Network Watcher
44
description: Manage and analyze Network Security Group Flow Logs in Azure using Network Watcher and Grafana.
55
author: halkazwini
6+
ms.author: halkazwini
67
ms.service: azure-network-watcher
78
ms.topic: how-to
8-
ms.date: 05/31/2024
9-
ms.author: halkazwini
9+
ms.date: 09/26/2024
1010
ms.custom: linux-related-content
1111
---
1212

1313
# Manage and analyze network security group flow logs using Network Watcher and Grafana
1414

15+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
16+
1517
[Network Security Group (NSG) flow logs](nsg-flow-logs-overview.md) provide information that can be used to understand ingress and egress IP traffic on network interfaces. These flow logs show outbound and inbound flows on a per NSG rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
1618

1719
You can have many NSGs in your network with flow logging enabled. This amount of logging data makes it cumbersome to parse and gain insights from your logs. This article provides a solution to centrally manage these NSG flow logs using Grafana, an open source graphing tool, ElasticSearch, a distributed search and analytics engine, and Logstash, which is an open source server-side data processing pipeline.

articles/network-watcher/network-watcher-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,8 @@ Network Watcher offers two traffic tools that help you log and visualize network
9393
- [Network security group flow logs](nsg-flow-logs-overview.md) and [Manage network security group flow logs](nsg-flow-logs-portal.md).
9494
- [Virtual network flow logs](vnet-flow-logs-overview.md) and [Manage virtual network flow logs](vnet-flow-logs-portal.md).
9595

96+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
97+
9698
### Traffic analytics
9799

98100
**Traffic analytics** provides rich visualizations of flow logs data. For more information about traffic analytics, see [traffic analytics](traffic-analytics.md) and [Manage traffic analytics using Azure Policy](traffic-analytics-policy-portal.md).

articles/network-watcher/network-watcher-visualize-nsg-flow-logs-open-source-tools.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,16 @@ title: Visualize NSG flow logs - Elastic Stack
33
titleSuffix: Azure Network Watcher
44
description: Manage and analyze network security group Flow Logs in Azure using Network Watcher and Elastic Stack.
55
author: halkazwini
6+
ms.author: halkazwini
67
ms.service: azure-network-watcher
78
ms.topic: how-to
8-
ms.date: 07/30/2024
9-
ms.author: halkazwini
9+
ms.date: 09/26/2024
1010
---
1111

1212
# Visualize Azure Network Watcher NSG flow logs using open source tools
1313

14+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
15+
1416
Network security group flow logs provide information that can be used understand ingress and egress IP traffic on network security groups. These flow logs show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
1517

1618
These flow logs can be difficult to manually parse and gain insights from. However, there are several open source tools that can help visualize this data. This article provides a solution to visualize these logs using the Elastic Stack, which allows you to quickly index and visualize your flow logs on a Kibana dashboard.

articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,16 @@ title: Visualizing Azure NSG flow logs - Power BI
33
titleSuffix: Azure Network Watcher
44
description: Learn how to use Power BI to visualize network security group flow logs to allow you to view information about IP traffic in Azure Network Watcher.
55
author: halkazwini
6+
ms.author: halkazwini
67
ms.service: azure-network-watcher
78
ms.topic: how-to
8-
ms.date: 06/23/2021
9-
ms.author: halkazwini
9+
ms.date: 09/26/2024
1010
---
1111

1212
# Visualizing network security group flow logs with Power BI
1313

14+
[!INCLUDE [NSG flow logs retirement](../../includes/network-watcher-nsg-flow-logs-retirement.md)]
15+
1416
Network security group flow logs allow you to view information about ingress and egress IP traffic on network security groups. These flow logs show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
1517

1618
It can be difficult to gain insights into flow logging data by manually searching the log files. In this article, we provide a solution to visualize your most recent flow logs and learn about traffic on your network.

0 commit comments

Comments
 (0)