Skip to content

Commit 16e5bb7

Browse files
authored
Merge pull request #200108 from JKirsch1/article-refresh-5
611212 | Refresh traffic analytics article
2 parents c743293 + 984f7c5 commit 16e5bb7

File tree

1 file changed

+84
-41
lines changed

1 file changed

+84
-41
lines changed
Lines changed: 84 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,61 +1,104 @@
11
---
22
title: Azure traffic analytics | Microsoft Docs
3-
description: Learn how to analyze Azure network security group flow logs with traffic analytics.
3+
description: Learn about traffic analytics. Gain an overview of this solution for viewing network activity, securing networks, and optimizing performance.
44
services: network-watcher
55
documentationcenter: na
6-
author: damendo
7-
6+
author: Harsha-CS
87
ms.service: network-watcher
9-
ms.topic: article
8+
ms.topic: conceptual
109
ms.tgt_pltfrm: na
1110
ms.workload: infrastructure-services
12-
ms.date: 01/04/2021
13-
ms.author: damendo
11+
ms.date: 06/01/2022
12+
ms.author: harshacs
1413
ms.reviewer: vinigam
15-
ms.custom: references_regions, devx-track-azurepowershell
14+
ms.custom:
15+
- references_regions
16+
- devx-track-azurepowershell
17+
- kr2b-contr-experiment
1618
---
1719

18-
# Traffic Analytics
20+
# Traffic analytics
21+
22+
Traffic analytics is a cloud-based solution that provides visibility into user and application activity in your cloud networks. Specifically, traffic analytics analyzes Azure Network Watcher network security group (NSG) flow logs to provide insights into traffic flow in your Azure cloud. With traffic analytics, you can:
1923

20-
Traffic Analytics is a cloud-based solution that provides visibility into user and application activity in cloud networks. Traffic analytics analyzes Network Watcher network security group (NSG) flow logs to provide insights into traffic flow in your Azure cloud. With traffic analytics, you can:
24+
- Visualize network activity across your Azure subscriptions.
25+
- Identify hot spots.
26+
- Secure your network by using information about the following components to identify threats:
2127

22-
- Visualize network activity across your Azure subscriptions and identify hot spots.
23-
- Identify security threats to, and secure your network, with information such as open-ports, applications attempting internet access, and virtual machines (VM) connecting to rogue networks.
24-
- Understand traffic flow patterns across Azure regions and the internet to optimize your network deployment for performance and capacity.
25-
- Pinpoint network misconfigurations leading to failed connections in your network.
28+
- Open ports
29+
- Applications that attempt to access the internet
30+
- Virtual machines (VMs) that connect to rogue networks
31+
32+
- Optimize your network deployment for performance and capacity by understanding traffic flow patterns across Azure regions and the internet.
33+
- Pinpoint network misconfigurations that can lead to failed connections in your network.
2634

2735
> [!NOTE]
28-
> Traffic Analytics now supports collecting NSG Flow Logs data at a higher frequency of 10 mins
36+
> Traffic analytics now supports collecting NSG flow logs data at a frequency of every 10 minutes.
2937
3038
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
3139

3240
## Why traffic analytics?
3341

34-
It is vital to monitor, manage, and know your own network for uncompromised security, compliance, and performance. Knowing your own environment is of paramount importance to protect and optimize it. You often need to know the current state of the network, who is connecting, where they're connecting from, which ports are open to the internet, expected network behavior, irregular network behavior, and sudden rises in traffic.
42+
It's vital to monitor, manage, and know your own network for uncompromised security, compliance, and performance. Knowing your own environment is of paramount importance to protect and optimize it. You often need to know the current state of the network, including the following information:
43+
44+
- Who is connecting to the network?
45+
- Where are they connecting from?
46+
- Which ports are open to the internet?
47+
- What's the expected network behavior?
48+
- Is there any irregular network behavior?
49+
- Are there any sudden rises in traffic?
3550

36-
Cloud networks are different than on-premises enterprise networks, where you have netflow or equivalent protocol capable routers and switches, which provide the capability to collect IP network traffic as it enters or exits a network interface. By analyzing traffic flow data, you can build an analysis of network traffic flow and volume.
51+
Cloud networks are different from on-premises enterprise networks. In on-premises networks, routers and switches support NetFlow and other, equivalent protocols. You can use these devices to collect data about IP network traffic as it enters or exits a network interface. By analyzing traffic flow data, you can build an analysis of network traffic flow and volume.
3752

38-
Azure virtual networks have NSG flow logs, which provide you information about ingress and egress IP traffic through a Network Security Group associated to individual network interfaces, VMs, or subnets. By analyzing raw NSG flow logs, and inserting intelligence of security, topology, and geography, traffic analytics can provide you with insights into traffic flow in your environment. Traffic Analytics provides information such as most communicating hosts, most communicating application protocols, most conversing host pairs, allowed/blocked traffic, inbound/outbound traffic, open internet ports, most blocking rules, traffic distribution per Azure datacenter, virtual network, subnets, or, rogue networks.
53+
With Azure virtual networks, NSG flow logs collect data about the network. These logs provide information about ingress and egress IP traffic through an NSG that's associated with individual network interfaces, VMs, or subnets. After analyzing raw NSG flow logs, traffic analytics combines the log data with intelligence about security, topology, and geography. Traffic analytics then provides you with insights into traffic flow in your environment.
54+
55+
Traffic analytics provides the following information:
56+
57+
- Most-communicating hosts
58+
- Most-communicating application protocols
59+
- Most-conversing host pairs
60+
- Allowed and blocked traffic
61+
- Inbound and outbound traffic
62+
- Open internet ports
63+
- Most-blocking rules
64+
- Traffic distribution per Azure datacenter, virtual network, subnets, or rogue network
3965

4066
## Key components
4167

42-
- **Network security group (NSG)**: Contains a list of security rules that allow or deny network traffic to resources connected to an Azure Virtual Network. NSGs can be associated to subnets, individual VMs (classic), or individual network interfaces (NIC) attached to VMs (Resource Manager). For more information, see [Network security group overview](../virtual-network/network-security-groups-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
43-
- **Network security group (NSG) flow logs**: Allow you to view information about ingress and egress IP traffic through a network security group. NSG flow logs are written in json format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, five-tuple information about the flow (source/destination IP address, source/destination port, and protocol), and if the traffic was allowed or denied. For more information about NSG flow logs, see [NSG flow logs](network-watcher-nsg-flow-logging-overview.md).
44-
- **Log Analytics**: An Azure service that collects monitoring data and stores the data in a central repository. This data can include events, performance data, or custom data provided through the Azure API. Once collected, the data is available for alerting, analysis, and export. Monitoring applications such as network performance monitor and traffic analytics are built using Azure Monitor logs as a foundation. For more information, see [Azure Monitor logs](../azure-monitor/logs/log-query-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
45-
- **Log Analytics workspace**: An instance of Azure Monitor logs, where the data pertaining to an Azure account, is stored. For more information about Log Analytics workspaces, see [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
46-
- **Network Watcher**: A regional service that enables you to monitor and diagnose conditions at a network scenario level in Azure. You can turn NSG flow logs on and off with Network Watcher. For more information, see [Network Watcher](network-watcher-monitoring-overview.md).
68+
- **Network security group (NSG)**: A resource that contains a list of security rules that allow or deny network traffic to resources that are connected to an Azure virtual network. NSGs can be associated with subnets, individual VMs (classic), or individual network interfaces (NICs) that are attached to VMs (Resource Manager). For more information, see [Network security group overview](../virtual-network/network-security-groups-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
69+
70+
- **NSG flow logs**: Recorded information about ingress and egress IP traffic through an NSG. NSG flow logs are written in JSON format and include:
71+
72+
- Outbound and inbound flows on a per rule basis.
73+
- The NIC that the flow applies to.
74+
- Information about the flow, such as the source and destination IP address, the source and destination port, and the protocol.
75+
- The status of the traffic, such as allowed or denied.
76+
77+
For more information about NSG flow logs, see [NSG flow logs](network-watcher-nsg-flow-logging-overview.md).
78+
79+
- **Log Analytics**: A tool in the Azure portal that you use to work with Azure Monitor Logs data. Azure Monitor Logs is an Azure service that collects monitoring data and stores the data in a central repository. This data can include events, performance data, or custom data that's provided through the Azure API. After this data is collected, it's available for alerting, analysis, and export. Monitoring applications such as network performance monitor and traffic analytics use Azure Monitor Logs as a foundation. For more information, see [Azure Monitor Logs](../azure-monitor/logs/log-query-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json). Log Analytics provides a way to edit and run queries on logs. You can also use this tool to analyze query results. For more information, see [Overview of Log Analytics in Azure Monitor](../azure-monitor/logs/log-analytics-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
80+
81+
- **Log Analytics workspace**: The environment that stores Azure Monitor log data that pertains to an Azure account. For more information about Log Analytics workspaces, see [Create a Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
82+
83+
- **Network Watcher**: A regional service that you can use to monitor and diagnose conditions at a network-scenario level in Azure. You can use Network Watcher to turn NSG flow logs on and off. For more information, see [Network Watcher](network-watcher-monitoring-overview.md).
4784

4885
## How traffic analytics works
4986

50-
Traffic analytics examines the raw NSG flow logs and captures reduced logs by aggregating common flows among the same source IP address, destination IP address, destination port, and protocol. For example, Host 1 (IP address: 10.10.10.10) communicating to Host 2 (IP address: 10.10.20.10), 100 times over a period of 1 hour using port (for example, 80) and protocol (for example, http). The reduced log has one entry, that Host 1 & Host 2 communicated 100 times over a period of 1 hour using port *80* and protocol *HTTP*, instead of having 100 entries. Reduced logs are enhanced with geography, security, and topology information, and then stored in a Log Analytics workspace. The following picture shows the data flow:
87+
Traffic analytics examines raw NSG flow logs. It then reduces the log volume by aggregating flows that have a common source IP address, destination IP address, destination port, and protocol.
5188

52-
![Data flow for NSG flow logs processing](./media/traffic-analytics/data-flow-for-nsg-flow-log-processing.png)
89+
An example might involve Host 1 at IP address 10.10.10.10 and Host 2 at IP address 10.10.20.10. Suppose these two hosts communicate 100 times over a period of one hour. The raw flow log has 100 entries in this case. If these hosts use the HTTP protocol on port 80 for each of those 100 interactions, the reduced log has one entry. That entry states that Host 1 and Host 2 communicated 100 times over a period of one hour by using the HTTP protocol on port 80.
90+
91+
Reduced logs are enhanced with geography, security, and topology information and then stored in a Log Analytics workspace. The following diagram shows the data flow:
92+
93+
:::image type="content" source="./media/traffic-analytics/data-flow-for-nsg-flow-log-processing.png" alt-text="Diagram that shows how network traffic data flows from an N S G log to an analytics dashboard. Middle steps include aggregation and enhancement.":::
5394

5495
## Prerequisites
5596

97+
Before you use traffic analytics, ensure your environment meets the following requirements.
98+
5699
### User access requirements
57100

58-
Your account must be a member of one of the following [Azure built-in roles](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json):
101+
One of the following [Azure built-in roles](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json) needs to be assigned to your account:
59102

60103
|Deployment model | Role |
61104
|--------- |--------- |
@@ -64,27 +107,27 @@ Your account must be a member of one of the following [Azure built-in roles](../
64107
| | Reader |
65108
| | Network Contributor |
66109

67-
If your account is not assigned to one of the built-in roles, it must be assigned to a [custom role](../role-based-access-control/custom-roles.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json) that is assigned the following actions, at the subscription level:
110+
If none of the preceding built-in roles are assigned to your account, assign a [custom role](../role-based-access-control/custom-roles.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json) to your account. The custom role should support the following actions at the subscription level:
68111

69-
- "Microsoft.Network/applicationGateways/read"
70-
- "Microsoft.Network/connections/read"
71-
- "Microsoft.Network/loadBalancers/read"
72-
- "Microsoft.Network/localNetworkGateways/read"
73-
- "Microsoft.Network/networkInterfaces/read"
74-
- "Microsoft.Network/networkSecurityGroups/read"
75-
- "Microsoft.Network/publicIPAddresses/read"
76-
- "Microsoft.Network/routeTables/read"
77-
- "Microsoft.Network/virtualNetworkGateways/read"
78-
- "Microsoft.Network/virtualNetworks/read"
79-
- "Microsoft.Network/expressRouteCircuits/read"
112+
- `Microsoft.Network/applicationGateways/read`
113+
- `Microsoft.Network/connections/read`
114+
- `Microsoft.Network/loadBalancers/read`
115+
- `Microsoft.Network/localNetworkGateways/read`
116+
- `Microsoft.Network/networkInterfaces/read`
117+
- `Microsoft.Network/networkSecurityGroups/read`
118+
- `Microsoft.Network/publicIPAddresses/read"`
119+
- `Microsoft.Network/routeTables/read`
120+
- `Microsoft.Network/virtualNetworkGateways/read`
121+
- `Microsoft.Network/virtualNetworks/read`
122+
- `Microsoft.Network/expressRouteCircuits/read`
80123

81-
For information on how to check user access permissions, see [Traffic analytics FAQ](traffic-analytics-faq.yml).
124+
For information about how to check user access permissions, see [Traffic analytics FAQ](traffic-analytics-faq.yml).
82125

83126
## Frequently asked questions
84127

85-
For frequent asked questions about Traffic Analytics, see [Traffic analytics FAQ](traffic-analytics-faq.yml).
128+
To get answers to frequently asked questions about traffic analytics, see [Traffic analytics FAQ](traffic-analytics-faq.yml).
86129

87130
## Next steps
88131

89-
- To learn how to enable flow logs, see [Enabling NSG flow logging](network-watcher-nsg-flow-logging-portal.md).
90-
- To understand the schema and processing details of Traffic Analytics, see [Traffic analytics schema](traffic-analytics-schema.md).
132+
- To learn how to turn on flow logs, see [Enable NSG flow log](network-watcher-nsg-flow-logging-portal.md#enable-nsg-flow-log).
133+
- To understand the schema and processing details of traffic analytics, see [Traffic analytics schema](traffic-analytics-schema.md).

0 commit comments

Comments
 (0)