You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-wan/monitor-virtual-wan-reference.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Azure Virtual WAN logs and metrics using Azure Monitor.
4
4
author: cherylmc
5
5
ms.service: virtual-wan
6
6
ms.topic: reference
7
-
ms.date: 06/08/2022
7
+
ms.date: 02/15/2024
8
8
ms.author: cherylmc
9
9
ms.custom: subject-monitoring
10
10
@@ -22,7 +22,7 @@ The following metric is available for virtual hub router within a virtual hub:
22
22
23
23
| Metric | Description|
24
24
| --- | --- |
25
-
|**Virtual Hub Data Processed**| Data on how much traffic traverses the virtual hub router in a given time period. Note that only the following flows use the virtual hub router: VNet to VNet (same hub and interhub) and VPN/ExpressRoute branch to VNet (interhub). If a virtual hub is secured with routing intent, then these flows will traverse the firewall instead of the hub router. |
25
+
|**Virtual Hub Data Processed**| Data on how much traffic traverses the virtual hub router in a given time period. Only the following flows use the virtual hub router: VNet to VNet (same hub and interhub) and VPN/ExpressRoute branch to VNet (interhub). If a virtual hub is secured with routing intent, then these flows traverse the firewall instead of the hub router. |
26
26
27
27
#### PowerShell steps
28
28
@@ -46,9 +46,9 @@ $MetricInformation.Data
46
46
47
47
***Time Grain** - Refers to the frequency at which you want to see the aggregation. In the current command, you'll see a selected aggregated unit per 5 mins. You can select – 5M/15M/30M/1H/6H/12H and 1D.
48
48
49
-
***Start Time and End Time** - This time is based on UTC, so please ensure that you're entering UTC values when inputting these parameters. If these parameters aren't used, the past one hour's worth of data is shown by default.
49
+
***Start Time and End Time** - This time is based on UTC. Ensure that you're entering UTC values when inputting these parameters. If these parameters aren't used, the past one hour's worth of data is shown by default.
50
50
51
-
***Sum Aggregation Type** - This aggregation type will show you the total number of bytes that traversed the virtual hub router during a selected time period. The **Max** and **Min** aggregation types are not meaningful.
51
+
***Sum Aggregation Type** - This aggregation type shows you the total number of bytes that traversed the virtual hub router during a selected time period. The **Max** and **Min** aggregation types aren't meaningful.
@@ -103,7 +103,7 @@ The following metrics are available for Virtual WAN point-to-site VPN gateways:
103
103
| Metric | Description|
104
104
| --- | --- |
105
105
|**Gateway P2S Bandwidth**| Average point-to-site aggregate bandwidth of a gateway in bytes per second. |
106
-
|**P2S Connection Count**|Point-to-site connection count of a gateway. To ensure you're viewing accurate Metrics in Azure Monitor, select the **Aggregation Type** for **P2S Connection Count** as **Sum**. You may also select **Max** if you split By **Instance**. |
106
+
|**P2S Connection Count**|Point-to-site connection count of a gateway. To ensure you're viewing accurate Metrics in Azure Monitor, select the **Aggregation Type** for **P2S Connection Count** as **Sum**. You can also select **Max** if you split By **Instance**. |
107
107
| **User VPN Routes Count** | Number of User VPN Routes configured on the VPN gateway. This metric can be broken down into **Static** and **Dynamic** Routes.
@@ -132,7 +132,7 @@ The following diagnostics are available for Virtual WAN site-to-site VPN gateway
132
132
| Metric | Description|
133
133
| --- | --- |
134
134
|**Gateway Diagnostic Logs**| Gateway-specific diagnostics such as health, configuration, service updates, and additional diagnostics.|
135
-
|**Tunnel Diagnostic Logs**| These are IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and additional diagnostics. For connect and disconnect events, these logs will also display the remote IP address of the corresponding on-premises VPN device.|
135
+
|**Tunnel Diagnostic Logs**| These are IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and additional diagnostics. For connect and disconnect events, these logs also display the remote IP address of the corresponding on-premises VPN device.|
136
136
|**Route Diagnostic Logs**| These are logs related to events for static routes, BGP, route updates, and additional diagnostics. |
137
137
|**IKE Diagnostic Logs**| IKE-specific diagnostics for IPsec connections. |
138
138
@@ -152,13 +152,13 @@ In Azure Virtual WAN, ExpressRoute gateway metrics can be exported as logs via a
152
152
153
153
### Log Analytics sample query
154
154
155
-
If you selected to send diagnostic data to a Log Analytics Workspace, then you can use SQL-like queries such as the example below to examine the data. For more information, see [Log Analytics Query Language](/services-hub/health/log-analytics-query-language).
155
+
If you selected to send diagnostic data to a Log Analytics Workspace, then you can use SQL-like queries, such as the following example, to examine the data. For more information, see [Log Analytics Query Language](/services-hub/health/log-analytics-query-language).
156
156
157
157
The following example contains a query to obtain site-to-site route diagnostics.
158
158
159
159
`AzureDiagnostics | where Category == "RouteDiagnosticLog"`
160
160
161
-
Replace the values below, after the **= =**, as needed based on the tables reported in the previous section of this article.
161
+
Replace the following values, after the **= =**, as needed based on the tables reported in the previous section of this article.
162
162
163
163
* "GatewayDiagnosticLog"
164
164
* "IKEDiagnosticLog"
@@ -170,7 +170,7 @@ In order to execute the query, you have to open the Log Analytics resource you c
170
170
171
171
:::image type="content" source="./media/monitor-virtual-wan-reference/log-analytics-query-samples.png" alt-text="Screenshot of Log Analytics Query samples." lightbox="./media/monitor-virtual-wan-reference/log-analytics-query-samples.png":::
172
172
173
-
For Azure Firewall, a [workbook](../firewall/firewall-workbook.md) is provided to make log analysis easier. Using its graphical interface, it will be possible to investigate the diagnostic data without manually writing any Log Analytics query.
173
+
For Azure Firewall, a [workbook](../firewall/firewall-workbook.md) is provided to make log analysis easier. Using its graphical interface, you can investigate the diagnostic data without manually writing any Log Analytics query.
174
174
175
175
## <aname="activity-logs"></a>Activity logs
176
176
@@ -184,7 +184,7 @@ For more information on the schema of Activity Log entries, see [Activity Log sc
184
184
185
185
For detailed description of the top-level diagnostic logs schema, see [Supported services, schemas, and categories for Azure Diagnostic Logs](../azure-monitor/essentials/resource-logs-schema.md).
186
186
187
-
When reviewing any metrics through Log Analytics, the output will contain the following columns:
187
+
When reviewing any metrics through Log Analytics, the output contains the following columns:
188
188
189
189
|**Column**|**Type**|**Description**|
190
190
| --- | --- | --- |
@@ -197,7 +197,7 @@ When reviewing any metrics through Log Analytics, the output will contain the fo
If you have chosen to secure your virtual hub using Azure Firewall, relevant logs and metrics are available here: [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
200
+
If you chose to secure your virtual hub using Azure Firewall, relevant logs and metrics are available here: [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
201
201
You can monitor the Secured Hub using Azure Firewall logs and metrics. You can also use activity logs to audit operations on Azure Firewall resources.
202
202
For every Azure Virtual WAN you secure and convert to a Secured Hub, an explicit firewall resource object is created in the resource group where the hub is located.
203
203
@@ -207,5 +207,5 @@ For every Azure Virtual WAN you secure and convert to a Secured Hub, an explicit
207
207
## Next steps
208
208
209
209
* To learn how to monitor Azure Firewall logs and metrics, see [Tutorial: Monitor Azure Firewall logs](../firewall/firewall-diagnostics.md).
210
-
* For additional information about Virtual WAN monitoring, see [Monitoring Azure Virtual WAN](monitor-virtual-wan.md).
210
+
* For more information about Virtual WAN monitoring, see [Monitoring Azure Virtual WAN](monitor-virtual-wan.md).
211
211
* To learn more about metrics in Azure Monitor, see [Metrics in Azure Monitor](../azure-monitor/essentials/data-platform-metrics.md).
0 commit comments