Skip to content

Commit 4128dbc

Browse files
authored
Corrections
1 parent ba16871 commit 4128dbc

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

articles/network-watcher/network-watcher-nsg-flow-logging-overview.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -30,23 +30,23 @@ It is vital to monitor, manage, and know your own network for uncompromised secu
3030

3131
Flow logs are the source of truth for all network activity in your cloud environment. Whether you're an upcoming startup trying to optimize resources or large enterprise trying to detect intrusion, Flow logs are your best bet. You can use it for optimizing network flows, monitoring throughput, verifying compliance, detecting intrusions and more.
3232

33-
## Common Use Cases
33+
## Common use cases
3434

35-
**Network Monitoring**: Identify unknown or undesired traffic. Monitor traffic levels and bandwidth consumption. Filter flow logs by IP and port to understand application behavior. Export Flow Logs to analytics and visualization tools of your choice to setup monitoring dashboards.
35+
**Network Monitoring**: Identify unknown or undesired traffic. Monitor traffic levels and bandwidth consumption. Filter flow logs by IP and port to understand application behavior. Export Flow Logs to analytics and visualization tools of your choice to set up monitoring dashboards.
3636

37-
**Usage monitoring and optimization:**: Identify top talkers in your network. Combine with GeoIP data to identify cross-region traffic. Understand traffic growth for capacity forecasting. Use data to remove overtly restrictive traffic rules.
37+
**Usage monitoring and optimization:** Identify top talkers in your network. Combine with GeoIP data to identify cross-region traffic. Understand traffic growth for capacity forecasting. Use data to remove overtly restrictive traffic rules.
3838

3939
**Compliance**: Use flow data to verify network isolation and compliance with enterprise access rules
4040

4141
**Network forensics & Security analysis**: Analyze network flows from compromised IPs and network interfaces. Export flow logs to any SIEM or IDS tool of your choice.
4242

43-
## How Logging works
43+
## How logging works
4444

4545
**Key Properties**
4646

47-
- Flow logs operate at [Layer 4](https://en.wikipedia.org/wiki/OSI_model#Layer_4:_Transport_Layer) and records all IP flows going in and out of an NSG
47+
- Flow logs operate at [Layer 4](https://en.wikipedia.org/wiki/OSI_model#Layer_4:_Transport_Layer) and record all IP flows going in and out of an NSG
4848
- Logs are collected through the Azure platform and do not affect customer resources or network performance in any way.
49-
- Logs are written in the JSON format and show outbound as well as inbound flows on a per NSG rule basis.
49+
- Logs are written in the JSON format and show outbound and inbound flows on a per NSG rule basis.
5050
- Each log record contains the network interface (NIC) the flow applies to, 5-tuple information, the traffic decision & (Version 2 only) throughput information. See _Log Format_ below for full details.
5151
- Flow Logs have a retention feature that allows automatically deleting the logs up to a year after their creation
5252

@@ -55,7 +55,7 @@ Flow logs are the source of truth for all network activity in your cloud environ
5555
- Software defined networks are organized around Virtual Networks (VNETs) and subnets. The security of these VNets and subnets can be managed using an NSG.
5656
- A Network security group (NSG) contains a list of _security rules_ that allow or deny network traffic in resources it is connected to. NSGs can be associated with subnets, individual VMs, or individual network interfaces (NIC) attached to VMs (Resource Manager). For more information, see [Network security group overview](https://docs.microsoft.com/azure/virtual-network/security-overview?toc=%2Fazure%2Fnetwork-watcher%2Ftoc.json).
5757
- All traffic flows in your network are evaluated using the rules in the applicable NSG.
58-
- The result of these evaluations is NSG Flow Logs. Flow logs are collected through the Azure platform and do not require any change to the customer resources.
58+
- The result of these evaluations is NSG Flow Logs. Flow logs are collected through the Azure platform and don't require any change to the customer resources.
5959
- NSG Flow Logs are written to storage accounts from where they can be accessed.
6060
- You can export, process, analyze, and visualize Flow Logs using tools like TA, Splunk, Grafana, Stealthwatch, etc.
6161

@@ -64,9 +64,9 @@ Flow logs are the source of truth for all network activity in your cloud environ
6464
Flow logs include the following properties:
6565

6666
* **time** - Time when the event was logged
67-
* **systemId** - Network Security Group resource Id.
67+
* **systemId** - Network Security Group resource ID.
6868
* **category** - The category of the event. The category is always **NetworkSecurityGroupFlowEvent**
69-
* **resourceid** - The resource Id of the NSG
69+
* **resourceid** - The resource ID of the NSG
7070
* **operationName** - Always NetworkSecurityGroupFlowEvents
7171
* **properties** - A collection of properties of the flow
7272
* **Version** - Version number of the Flow Log event schema
@@ -283,7 +283,7 @@ The text that follows is an example of a flow log. As you can see, there are mul
283283
}
284284

285285
```
286-
**Log Tuple Explained**
286+
**Log tuple explained**
287287

288288
![flow logs overview](./media/network-watcher-nsg-flow-logging-overview/tuple.png)
289289

@@ -298,21 +298,21 @@ Flow tuples from a TCP conversation between 185.170.185.105:35370 and 10.2.0.4:2
298298
For continuation _C_ and end _E_ flow states, byte and packet counts are aggregate counts from the time of the previous flow tuple record. Referencing the previous example conversation, the total number of packets transferred is 1021+52+8005+47 = 9125. The total number of bytes transferred is 588096+29952+4610880+27072 = 5256000.
299299

300300

301-
## Enabling Flow logs
301+
## Enabling NSG Flow Logs
302302

303303
Use the relevant link from below for guides on enabling flow logs.
304304

305-
- [Azure Portal](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-portal)
306-
- [Powershell](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-powershell)
305+
- [Azure portal](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-portal)
306+
- [PowerShell](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-powershell)
307307
- [CLI](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-cli)
308308
- [REST](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-rest)
309-
- [ARM](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-azure-resource-manager)
309+
- [Azure Resource Manager](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-azure-resource-manager)
310310

311311
## Updating parameters
312312

313-
**Azure Portal**
313+
**Azure portal**
314314

315-
On the Azure Portal, navigate to the NSG Flow Logs section in Network Watcher. Then click the name of the NSG. This will bring up the settings pane for the Flow log. Change the parameters you want and hit **Save** to deploy the changes.
315+
On the Azure portal, navigate to the NSG Flow Logs section in Network Watcher. Then click the name of the NSG. This will bring up the settings pane for the Flow log. Change the parameters you want and hit **Save** to deploy the changes.
316316

317317
**PS/CLI/REST/ARM**
318318

@@ -335,7 +335,7 @@ https://{storageAccountName}.blob.core.windows.net/insights-logs-networksecurity
335335
*Visualize flow Logs*
336336

337337
- [Azure Traffic analytics](https://docs.microsoft.com/azure/network-watcher/traffic-analytics) is an Azure native service to process flow logs, extracts insights and visualize flow logs.
338-
- [[Tutorial] Visualize NSG Flow logs with PowerBI](https://docs.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi)
338+
- [[Tutorial] Visualize NSG Flow logs with Power BI](https://docs.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-power-bi)
339339
- [[Tutorial] Visualize NSG Flow logs with Elastic Stack](https://docs.microsoft.com/azure/network-watcher/network-watcher-visualize-nsg-flow-logs-open-source-tools)
340340
- [[Tutorial] Manage and analyze NSG Flow logs using Grafana](https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-grafana)
341341
- [[Tutorial] Manage and analyze NSG Flow logs using Graylog](https://docs.microsoft.com/azure/network-watcher/network-watcher-analyze-nsg-flow-logs-graylog)
@@ -358,11 +358,11 @@ https://{storageAccountName}.blob.core.windows.net/insights-logs-networksecurity
358358

359359
**Enable on critical VNETs/Subnets**: Flow Logs should be enabled on all critical VNETs/subnets in your subscription as an auditability and security best practice.
360360

361-
**Enable NSG Flow Logging on all NSGs attached to a resource**: Flow logging in Azure is configured on the NSG resource. A flow will only be associated to one NSG Rule. In scenarios where multiple NSGs are utilized, we recommend that NSG flow logging is enabled on all NSGs applied a resource's subnet or network interface to ensure that all traffic is recorded. For more information, see [how traffic is evaluated](../virtual-network/security-overview.md#how-traffic-is-evaluated) in Network Security Groups.
361+
**Enable NSG Flow Logging on all NSGs attached to a resource**: Flow logging in Azure is configured on the NSG resource. A flow will only be associated to one NSG Rule. In scenarios where multiple NSGs are utilized, we recommend enabling NSG flow logs on all NSGs applied a resource's subnet or network interface to ensure that all traffic is recorded. For more information, see [how traffic is evaluated](../virtual-network/security-overview.md#how-traffic-is-evaluated) in Network Security Groups.
362362

363363
**Storage provisioning**: Storage should be provisioned in tune with expected Flow Log volume.
364364

365-
## Troubleshooting Common Issues
365+
## Troubleshooting common issues
366366

367367
### **I could not enable NSG Flow Logs**
368368

0 commit comments

Comments
 (0)