You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If bot protection is enabled, incoming requests that match bot rules are logged at the FrontdoorWebApplicationFirewallLog log. You may access WAF logs from a storage account, event hub, or log analytics.
107
+
If bot protection is enabled, incoming requests that match bot rules are logged. You may access WAF logs from a storage account, event hub, or log analytics.
"{{azure-ref}}" inserts the unique reference string in the response body. The value matches the TrackingReference field in the `FrontdoorAccessLog` and
29
-
`FrontdoorWebApplicationFirewallLog` logs.
28
+
::: zone pivot="front-door-standard-premium"
29
+
30
+
"{{azure-ref}}" inserts the unique reference string in the response body. The value matches the TrackingReference field in the `FrontDoorAccessLog` and `FrontDoorWebApplicationFirewallLog` logs.
31
+
32
+
::: zone-end
33
+
34
+
::: zone pivot="front-door-classic"
35
+
36
+
"{{azure-ref}}" inserts the unique reference string in the response body. The value matches the TrackingReference field in the `FrontdoorAccessLog` and `FrontdoorWebApplicationFirewallLog` logs.
37
+
38
+
::: zone-end
30
39
31
40
## Configure custom response status code and message use PowerShell
@@ -95,6 +132,8 @@ The following shows an example log entry:
95
132
}
96
133
```
97
134
135
+
::: zone-end
136
+
98
137
### WAF logs
99
138
100
139
::: zone pivot="front-door-standard-premium"
@@ -114,19 +153,29 @@ The following table shows the values logged for each request:
114
153
| Property | Description |
115
154
| ------------- | ------------- |
116
155
| Action |Action taken on the request. Logs include requests with all actions. Metrics include requests with all actions except *Log*.|
117
-
|ClientIp| The IP address of the client that made the request. If there was an `X-Forwarded-For` header in the request, the client IP address is taken from that header field instead. |
156
+
|ClientIP| The IP address of the client that made the request. If there was an `X-Forwarded-For` header in the request, the client IP address is taken from that header field instead. |
118
157
| ClientPort | The IP port of the client that made the request. |
119
158
| Details | Additional details on the request, including any threats that were detected. <br />matchVariableName: HTTP parameter name of the request matched, for example, header names (up to 100 characters maximum).<br /> matchVariableValue: Values that triggered the match (up to 100 characters maximum). |
120
159
| Host | The `Host` header of the request. |
121
160
| Policy | The name of the WAF policy that processed the request. |
122
161
| PolicyMode | Operations mode of the WAF policy. Possible values are `Prevention` and `Detection`. |
123
162
| RequestUri | Full URI of the request. |
124
163
| RuleName | The name of the WAF rule that the request matched. |
125
-
|SocketIp| The source IP address seen by WAF. This IP address is based on the TCP session, and does not consider any request headers. |
164
+
|SocketIP| The source IP address seen by WAF. This IP address is based on the TCP session, and does not consider any request headers. |
126
165
| TrackingReference | The unique reference string that identifies a request served by Front Door. This value is sent to the client in the `X-Azure-Ref` response header. Use this field when searching for a specific request in the log. |
127
166
128
167
The following example query shows the requests that were blocked by the Front Door WAF:
129
168
169
+
::: zone pivot="front-door-standard-premium"
170
+
171
+
```kusto
172
+
AzureDiagnostics
173
+
| where ResourceProvider == "MICROSOFT.CDN" and Category == "FrontDoorWebApplicationFirewallLog"
174
+
| where action_s == "Block"
175
+
```
176
+
177
+
::: zone-end
178
+
130
179
::: zone pivot="front-door-classic"
131
180
132
181
```kusto
@@ -137,17 +186,41 @@ AzureDiagnostics
137
186
138
187
::: zone-end
139
188
189
+
The following shows an example log entry, including the reason that the request was blocked:
190
+
140
191
::: zone pivot="front-door-standard-premium"
141
192
142
-
```kusto
143
-
AzureDiagnostics
144
-
| where ResourceProvider == "MICROSOFT.CDN" and Category == "FrontDoorWebApplicationFirewallLog"
0 commit comments