Skip to content

Commit 23423c5

Browse files
authored
Merge pull request #231991 from vhorne/fw-net-rule-name-log-ga
Remove network rule name logging from preview
2 parents d21b67f + c8a9195 commit 23423c5

File tree

5 files changed

+5
-65
lines changed

5 files changed

+5
-65
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11503,6 +11503,11 @@
1150311503
"redirect_url": "/azure/firewall/ftp-support",
1150411504
"redirect_document_id": false
1150511505
},
11506+
{
11507+
"source_path_from_root": "/articles/firewall/firewall-network-rule-logging.md",
11508+
"redirect_url": "/azure/firewall/firewall-diagnostics",
11509+
"redirect_document_id": false
11510+
},
1150611511
{
1150711512
"source_path_from_root": "/articles/security/governance-in-azure.md",
1150811513
"redirect_url": "/azure/governance/",

articles/firewall/firewall-network-rule-logging.md

Lines changed: 0 additions & 52 deletions
This file was deleted.

articles/firewall/firewall-preview.md

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -27,16 +27,6 @@ This article will be updated to reflect the features that are currently in previ
2727

2828
The following features are available in preview.
2929

30-
### Network rule name logging (preview)
31-
32-
With this new feature, the event logs for network rules adds the following attributes:
33-
- Policy name
34-
- Rule collection group
35-
- Rule collection
36-
- Rule name
37-
38-
For more information, see [Azure Firewall network rule name logging (preview)](firewall-network-rule-logging.md).
39-
4030
### Structured Firewall Logs (preview)
4131

4232
With Structured Firewall Logs, you'll be able to choose to use Resource Specific tables instead of an existing AzureDiagnostics table. Structured Firewall Logs is required for Policy Analytics. This new method helps you with better log querying and is recommended because:

articles/firewall/overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,6 @@ Azure Firewall Standard has the following known issues:
112112
|DNAT rule for allow *any* (*) will SNAT traffic.|If a DNAT rule allows *any* (*) as the Source IP address, then an implicit Network rule matches VNet-VNet traffic and will always SNAT the traffic.|This is a current limitation.|
113113
|Adding a DNAT rule to a secured virtual hub with a security provider isn't supported.|This results in an asynchronous route for the returning DNAT traffic, which goes to the security provider.|Not supported.|
114114
| Error encountered when creating more than 2000 rule collections. | The maximal number of NAT/Application or Network rule collections is 2000 (Resource Manager limit). | This is a current limitation. |
115-
|Unable to see Network Rule Name in Azure Firewall Logs|Azure Firewall network rule log data doesn't show the Rule name for network traffic.|Network rule name logging is in preview. For for information, see [Azure Firewall preview features](firewall-preview.md#network-rule-name-logging-preview).|
116115
|XFF header in HTTP/S|XFF headers are overwritten with the original source IP address as seen by the firewall. This is applicable for the following use cases:<br>- HTTP requests<br>- HTTPS requests with TLS termination|A fix is being investigated.|
117116
|Can't upgrade to Premium with Availability Zones in the Southeast Asia region|You can't currently upgrade to Azure Firewall Premium with Availability Zones in the Southeast Asia region.|Deploy a new Premium firewall in Southeast Asia without Availability Zones, or deploy in a region that supports Availability Zones.|
118117
|Can’t deploy Firewall with Availability Zones with a newly created Public IP address|When you deploy a Firewall with Availability Zones, you can’t use a newly created Public IP address.|First create a new zone redundant Public IP address, then assign this previously created IP address during the Firewall deployment.|

articles/firewall/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,6 @@ items:
7373
href: logs-and-metrics.md
7474
- name: Structured Firewall Logs
7575
href: firewall-structured-logs.md
76-
- name: Network rule name logging
77-
href: firewall-network-rule-logging.md
7876
- name: Threat intelligence
7977
href: threat-intel.md
8078
- name: Policy rule sets

0 commit comments

Comments
 (0)