You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/enable-top-ten-and-flow-trace.md
+13-10Lines changed: 13 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Enable Top flows and Flow trace logs in Azure Firewall
3
-
description: Learn how to enable the Top flows and Flow trace logs in Azure Firewall
3
+
description: Learn how to enable the Top flows and Flow trace logs in Azure Firewall.
4
4
services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
@@ -25,7 +25,7 @@ The Top flows log (known in the industry as Fat Flows), shows the top connection
25
25
> Activate Top flows logs only when troubleshooting a specific issue to avoid excessive CPU usage of Azure Firewall.
26
26
>
27
27
28
-
The flow rate is defined as the data transmission rate (in Megabits per second units). In other words, it is a measure of the amount of digital data that can be transmitted over a network in a period of time through the firewall. The Top Flows protocol runs periodically every three minutes. The minimum threshold to be considered a Top Flow is 1 Mbps.
28
+
The flow rate is defined as the data transmission rate (in Megabits per second units). In other words, it's a measure of the amount of digital data that can be transmitted over a network in a period of time through the firewall. The Top Flows protocol runs periodically every three minutes. The minimum threshold to be considered a Top Flow is 1 Mbps.
29
29
30
30
### Prerequisites
31
31
@@ -67,7 +67,7 @@ There are a few ways to verify the update was successful, but you can navigate t
67
67
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
68
68
2. Type a Diagnostic setting name.
69
69
3. Select **Azure Firewall Fat Flow Log** under **Categories** and any other logs you want to be supported in the firewall.
70
-
4. In Destination details, select **Send to Log Analytics** workspace
70
+
4. In Destination details, select **Send to Log Analytics** workspace.
71
71
1. Choose your desired Subscription and preconfigured Log Analytics workspace.
@@ -82,21 +82,22 @@ There are a few ways to verify the update was successful, but you can navigate t
82
82
83
83
## Flow trace
84
84
85
-
Currently, the firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *syn* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing has occurred.
85
+
Currently, the firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred.
86
+
86
87
87
88
> [!TIP]
88
89
> To avoid excessive disk usage caused by Flow trace logs in Azure Firewall with many short-lived connections, activate the logs only when troubleshooting a specific issue for diagnostic purposes.
89
90
90
91
The following additional properties can be added:
91
92
- SYN-ACK
92
93
93
-
Ack flag that indicates acknowledgment of SYN packet.
94
+
ACK flag that indicates acknowledgment of SYN packet.
94
95
- FIN
95
96
96
97
Finished flag of the original packet flow. No more data is transmitted in the TCP flow.
97
98
- FIN-ACK
98
99
99
-
Ack flag that indicates acknowledgment of FIN packet.
100
+
ACK flag that indicates acknowledgment of FIN packet.
100
101
101
102
- RST
102
103
@@ -109,12 +110,14 @@ The following additional properties can be added:
109
110
For example:
110
111
- A TCP packet lands on a Virtual Machine Scale Sets instance, which doesn't have any prior history for this packet
111
112
- Bad CheckSum packets
112
-
- Connection Tracking table entry is full and new connections cannot be accepted
113
+
- Connection Tracking table entry is full and new connections can't be accepted
113
114
- Overly delayed ACK packets
114
115
116
+
Flow Trace logs, such as SYN-ACK and ACK, are exclusively logged for network traffic. In addition, SYN packets aren't logged by default. However, you can access the initial SYN packets within the network rule logs.
It can take several minutes for this to take effect. Once the feature is completely registered, consider performing an update on Azure Firewall for the change to take effect immediately.
134
+
It can take several minutes for this to take effect. Once the feature is registered, consider performing an update on Azure Firewall for the change to take effect immediately.
132
135
133
136
To check the status of the AzResourceProvider registration, you can run the Azure PowerShell command:
134
137
@@ -146,7 +149,7 @@ To disable the log, you can unregister it using the following command or select
146
149
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
147
150
2. Type a Diagnostic setting name.
148
151
3. Select **Azure Firewall Flow Trace Log** under **Categories** and any other logs you want to be supported in the firewall.
149
-
4. In Destination details, select **Send to Log Analytics** workspace
152
+
4. In Destination details, select **Send to Log Analytics** workspace.
150
153
1. Choose your desired Subscription and preconfigured Log Analytics workspace.
0 commit comments