Skip to content

Commit 54d835c

Browse files
committed
add note for trace logs
1 parent dea9b3b commit 54d835c

File tree

1 file changed

+13
-10
lines changed

1 file changed

+13
-10
lines changed

articles/firewall/enable-top-ten-and-flow-trace.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Enable Top flows and Flow trace logs in Azure Firewall
3-
description: Learn how to enable the Top flows and Flow trace logs in Azure Firewall
3+
description: Learn how to enable the Top flows and Flow trace logs in Azure Firewall.
44
services: firewall
55
author: vhorne
66
ms.service: firewall
@@ -25,7 +25,7 @@ The Top flows log (known in the industry as Fat Flows), shows the top connection
2525
> Activate Top flows logs only when troubleshooting a specific issue to avoid excessive CPU usage of Azure Firewall.
2626
>
2727
28-
The flow rate is defined as the data transmission rate (in Megabits per second units). In other words, it is a measure of the amount of digital data that can be transmitted over a network in a period of time through the firewall. The Top Flows protocol runs periodically every three minutes. The minimum threshold to be considered a Top Flow is 1 Mbps.
28+
The flow rate is defined as the data transmission rate (in Megabits per second units). In other words, it's a measure of the amount of digital data that can be transmitted over a network in a period of time through the firewall. The Top Flows protocol runs periodically every three minutes. The minimum threshold to be considered a Top Flow is 1 Mbps.
2929

3030
### Prerequisites
3131

@@ -67,7 +67,7 @@ There are a few ways to verify the update was successful, but you can navigate t
6767
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
6868
2. Type a Diagnostic setting name.
6969
3. Select **Azure Firewall Fat Flow Log** under **Categories** and any other logs you want to be supported in the firewall.
70-
4. In Destination details, select **Send to Log Analytics** workspace
70+
4. In Destination details, select **Send to Log Analytics** workspace.
7171
1. Choose your desired Subscription and preconfigured Log Analytics workspace.
7272
1. Enable **Resource specific**.
7373
:::image type="content" source="media/enable-top-ten-and-flow-trace/log-destination-details.png" alt-text="Screenshot showing log destination details.":::
@@ -82,21 +82,22 @@ There are a few ways to verify the update was successful, but you can navigate t
8282

8383
## Flow trace
8484

85-
Currently, the firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *syn* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing has occurred.
85+
Currently, the firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred.
86+
8687

8788
> [!TIP]
8889
> To avoid excessive disk usage caused by Flow trace logs in Azure Firewall with many short-lived connections, activate the logs only when troubleshooting a specific issue for diagnostic purposes.
8990
9091
The following additional properties can be added:
9192
- SYN-ACK
9293

93-
Ack flag that indicates acknowledgment of SYN packet.
94+
ACK flag that indicates acknowledgment of SYN packet.
9495
- FIN
9596

9697
Finished flag of the original packet flow. No more data is transmitted in the TCP flow.
9798
- FIN-ACK
9899

99-
Ack flag that indicates acknowledgment of FIN packet.
100+
ACK flag that indicates acknowledgment of FIN packet.
100101

101102
- RST
102103

@@ -109,12 +110,14 @@ The following additional properties can be added:
109110
For example:
110111
- A TCP packet lands on a Virtual Machine Scale Sets instance, which doesn't have any prior history for this packet
111112
- Bad CheckSum packets
112-
- Connection Tracking table entry is full and new connections cannot be accepted
113+
- Connection Tracking table entry is full and new connections can't be accepted
113114
- Overly delayed ACK packets
114115

116+
Flow Trace logs, such as SYN-ACK and ACK, are exclusively logged for network traffic. In addition, SYN packets aren't logged by default. However, you can access the initial SYN packets within the network rule logs.
117+
115118
### Prerequisites
116119

117-
- Enable [structured logs](firewall-structured-logs.md#enable-structured-logs)
120+
- Enable [structured logs](firewall-structured-logs.md#enable-structured-logs).
118121
- Use the Azure Resource Specific Table format in [Diagnostic Settings](firewall-diagnostics.md#enable-diagnostic-logging-through-the-azure-portal).
119122

120123
### Enable the log
@@ -128,7 +131,7 @@ Register-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderN
128131
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
129132
```
130133

131-
It can take several minutes for this to take effect. Once the feature is completely registered, consider performing an update on Azure Firewall for the change to take effect immediately.
134+
It can take several minutes for this to take effect. Once the feature is registered, consider performing an update on Azure Firewall for the change to take effect immediately.
132135

133136
To check the status of the AzResourceProvider registration, you can run the Azure PowerShell command:
134137

@@ -146,7 +149,7 @@ To disable the log, you can unregister it using the following command or select
146149
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
147150
2. Type a Diagnostic setting name.
148151
3. Select **Azure Firewall Flow Trace Log** under **Categories** and any other logs you want to be supported in the firewall.
149-
4. In Destination details, select **Send to Log Analytics** workspace
152+
4. In Destination details, select **Send to Log Analytics** workspace.
150153
1. Choose your desired Subscription and preconfigured Log Analytics workspace.
151154
1. Enable **Resource specific**.
152155
:::image type="content" source="media/enable-top-ten-and-flow-trace/log-destination-details.png" alt-text="Screenshot showing log destination details.":::

0 commit comments

Comments
 (0)