Skip to content

Commit 4a4a329

Browse files
Merge pull request #228611 from halkazwini/nw-nsg-flow2
tweak
2 parents dcbbc83 + 2281471 commit 4a4a329

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/network-watcher/network-watcher-nsg-flow-logging-overview.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: halkazwini
77
ms.service: network-watcher
88
ms.topic: conceptual
99
ms.workload: infrastructure-services
10-
ms.date: 02/26/2023
10+
ms.date: 02/27/2023
1111
ms.author: halkazwini
1212
ms.custom: template-concept, engagement-fy23
1313
---
@@ -53,7 +53,7 @@ Key properties of NSG flow logs include:
5353
- Logs are collected at 1-minute intervals through the Azure platform. They don't affect your Azure resources or network performance in any way.
5454
- Logs are written in JSON format and show outbound and inbound flows per network security group rule.
5555
- Each log record contains the network interface (NIC) that the flow applies to, 5-tuple information, the traffic decision, and (for version 2 only) throughput information.
56-
- NSG Flow logs have a retention feature that allows deleting the logs automatically up to a year after their creation.
56+
- NSG flow logs have a retention feature that allows deleting the logs automatically up to a year after their creation.
5757

5858
> [!NOTE]
5959
> Retention is available only if you use [general-purpose v2 storage accounts](../storage/common/storage-account-overview.md#types-of-storage-accounts).
@@ -63,15 +63,15 @@ Core concepts for flow logs include:
6363
- Software-defined networks are organized around virtual networks and subnets. You can manage the security of these virtual networks and subnets by using network security groups.
6464
- A network security group contains *security rules* that allow or deny network traffic to or from the Azure resources that the network security group is connected to. A network security group can be associated with a subnet or a network interface of a virtual machine (VM). For more information, see [Network security group overview](../virtual-network/network-security-groups-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json).
6565
- All traffic flows in your network are evaluated through the rules in the applicable network security group. The result of these evaluations is NSG flow logs.
66-
- NSG Flow logs are collected through the Azure platform and don't require any change to your Azure resources.
66+
- NSG flow logs are collected through the Azure platform and don't require any change to your Azure resources.
6767
- There are two types of network security group rules: terminating and non-terminating. Each has different logging behaviors:
6868
- *Deny* rules are terminating. The network security group that's denying the traffic will log it in the flow logs. Processing in this case stops after any NSG denies traffic.
6969
- *Allow* rules are non-terminating. If the network security group allows the traffic, processing continues to the next network security group. The last network security group that allows traffic will log the traffic to the flow logs.
7070
- NSG flow logs are written to storage accounts. You can export, process, analyze, and visualize NSG flow logs by using tools like Network Watcher traffic analytics, Splunk, Grafana, and Stealthwatch.
7171

7272
## Log format
7373

74-
NSG Flow logs include the following properties:
74+
NSG flow logs include the following properties:
7575

7676
* `time`: Time when the event was logged.
7777
* `systemId`: System ID of the network security group.
@@ -342,7 +342,7 @@ To update parameters via command-line tools, use the same command that you used
342342
- [Read flow logs by using PowerShell functions](./network-watcher-read-nsg-flow-logs.md)
343343
- [Export NSG flow logs to Splunk](https://www.splunk.com/en_us/blog/platform/splunking-azure-nsg-flow-logs.html)
344344

345-
NSG flow logs target network security groups and aren't displayed the same way as the other logs. NSG Flow logs are stored only in a storage account and follow the logging path shown in the following example:
345+
NSG flow logs target network security groups and aren't displayed the same way as the other logs. NSG flow logs are stored only in a storage account and follow the logging path shown in the following example:
346346

347347
```
348348
https://{storageAccountName}.blob.core.windows.net/insights-logs-networksecuritygroupflowevent/resourceId=/SUBSCRIPTIONS/{subscriptionID}/RESOURCEGROUPS/{resourceGroupName}/PROVIDERS/MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/{nsgName}/y={year}/m={month}/d={day}/h={hour}/m=00/macAddress={macAddress}/PT1H.json

0 commit comments

Comments
 (0)