Skip to content

Commit 3b04fa1

Browse files
committed
Made requested changes to warning/note format and text
1 parent 1b57073 commit 3b04fa1

9 files changed

+23
-14
lines changed

articles/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ ms.author: mareat
2424

2525
You can have many network security groups in your network with flow logging enabled. Several network security groups with flow logging enabled can make it cumbersome to parse and gain insights from your logs. This article provides a solution to centrally manage these network security group flow logs using Graylog, an open source log management and analysis tool, and Logstash, an open source server-side data processing pipeline.
2626

27-
[!Warning] This scenario leverages NSG Flow Logs version 1 and will not support version 2 without modification.
27+
> [!Warning]
28+
> The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
2829
2930
## Scenario
3031

articles/network-watcher/network-watcher-nsg-flow-logging-cli.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,8 @@ Network Security Group flow logs are a feature of Network Watcher that allows yo
3131

3232
To perform the steps in this article, you need to [install the Azure command-line interface for Mac, Linux, and Windows (CLI)](/cli/azure/install-azure-cli).
3333

34-
[!NOTE] Flow Logs Version 2 are only available in select the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
34+
> [!NOTE]
35+
> Flow Logs Version 2 are only available in the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
3536
3637
## Register Insights provider
3738

articles/network-watcher/network-watcher-nsg-flow-logging-overview.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,9 @@ Flow logs include the following properties:
6666
* **Packets - Destination to source - Version 2 Only** The total number of TCP or UDP packets sent from destination to source since last update.
6767
* **Bytes sent - Destination to source - Version 2 Only** The total number of TCP and UDP packet bytes sent from destination to source since last update. Packet bytes include packet header and payload.
6868

69-
## NSG Flow Logs Version 2
70-
[!NOTE] Flow Logs Version 2 are only available in select the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
69+
## NSG flow logs version 2
70+
> [!NOTE]
71+
> Flow Logs Version 2 are only available in the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
7172
7273
Version 2 of the logs introduces flow state. You can configure which version of flow logs you receive. To learn how to enable flow logs, see [Enabling NSG flow logging](network-watcher-nsg-flow-logging-portal.md).
7374

@@ -85,15 +86,15 @@ For continuation *C* and end *E* flow states, byte and packet counts are aggrega
8586

8687
The text that follows is an example of a flow log. As you can see, there are multiple records that follow the property list described in the preceding section.
8788

88-
##Sample Log Records
89-
=======
89+
## Sample log records
90+
9091
The text that follows is an example of a flow log. As you can see, there are multiple records that follow the property list described in the preceding section.
9192

9293

9394
> [!NOTE]
9495
> Values in the **flowTuples* property are a comma-separated list.
9596
96-
### Version 1 NSG Flow Log Format Sample
97+
### Version 1 NSG flow log format sample
9798
```json
9899
{
99100
"records": [
@@ -202,7 +203,7 @@ The text that follows is an example of a flow log. As you can see, there are mul
202203
,
203204
...
204205
```
205-
### Version 2 NSG Flow Log Format Sample
206+
### Version 2 NSG flow log format sample
206207
```json
207208
{
208209
"records": [

articles/network-watcher/network-watcher-nsg-flow-logging-portal.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,8 @@ A network security group (NSG) enables you to filter inbound traffic to, and out
3434
3535
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
3636

37-
[!NOTE] Flow Logs Version 2 are only available in select the West Central US Region. Configuration is available through the Azure portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs saved to your storage account.
37+
> [!NOTE]
38+
> Flow Logs Version 2 are only available in the West Central US Region. Configuration is available through the Azure portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs saved to your storage account.
3839
3940
## Create a VM
4041

articles/network-watcher/network-watcher-nsg-flow-logging-powershell.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ ms.author: jdial
2929
3030
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in json format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
3131

32-
[!NOTE] Flow Logs Version 2 are only availble in select the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
32+
> [!NOTE]
33+
> Flow Logs Version 2 are only availble in the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
3334
3435
## Register Insights provider
3536

articles/network-watcher/network-watcher-nsg-flow-logging-rest.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ ms.author: jdial
2929
3030
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in json format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
3131

32-
[!NOTE] Flow Logs Version 2 are only available in select the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
32+
> [!NOTE]
33+
> Flow Logs Version 2 are only available in the West Central US Region. Configuration is available through the Azure Portal and REST API. Enabling Version 2 logs in an unsupported region will result in Version 1 logs outputted to your storage account.
3334
3435
## Before you begin
3536

articles/network-watcher/network-watcher-nsg-grafana.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,8 @@ ms.author: mareat
2222

2323
[Network Security Group (NSG) flow logs](network-watcher-nsg-flow-logging-overview.md) provide information that can be used to understand ingress and egress IP traffic on network interfaces. These flow logs show outbound and inbound flows on a per NSG rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
2424

25-
[!Warning] The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
25+
> [!Warning]
26+
> The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
2627
2728
You can have many NSGs in your network with flow logging enabled. This amount of logging data makes it cumbersome to parse and gain insights from your logs. This article provides a solution to centrally manage these NSG flow logs using Grafana, an open source graphing tool, ElasticSearch, a distributed search and analytics engine, and Logstash, which is an open source server-side data processing pipeline.
2829

articles/network-watcher/network-watcher-visualize-nsg-flow-logs-open-source-tools.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ Network Security Group flow logs provide information that can be used understand
2323

2424
These flow logs can be difficult to manually parse and gain insights from. However, there are several open source tools that can help visualize this data. This article will provide a solution to visualize these logs using the Elastic Stack, which will allow you to quickly index and visualize your flow logs on a Kibana dashboard.
2525

26-
[!Warning] The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
26+
> [!Warning]
27+
> The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
2728
2829
## Scenario
2930

articles/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ Network Security Group flow logs allow you to view information about ingress and
2323

2424
It can be difficult to gain insights into flow logging data by manually searching the log files. In this article, we provide a solution to visualize your most recent flow logs and learn about traffic on your network.
2525

26-
[!Warning] The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
26+
> [!Warning]
27+
> The following steps work with flow logs version 1. For details, see [Introduction to flow logging for network security groups](network-watcher-nsg-flow-logging-overview.md). The following instructions will not work with version 2 of the log files, without modification.
2728
2829
## Scenario
2930

0 commit comments

Comments
 (0)