Skip to content

Commit 7dd258b

Browse files
Merge pull request #208385 from Harsha-CS/patch-5
Update network-watcher-nsg-flow-logging-overview.md
2 parents ad09fb7 + bddbb67 commit 7dd258b

File tree

1 file changed

+8
-3
lines changed

1 file changed

+8
-3
lines changed

articles/network-watcher/network-watcher-nsg-flow-logging-overview.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ titleSuffix: Azure Network Watcher
44
description: This article explains how to use the NSG flow logs feature of Azure Network Watcher.
55
services: network-watcher
66
documentationcenter: na
7-
author: damendo
7+
author: harshacs
88

99
ms.service: network-watcher
1010
ms.topic: article
1111
ms.tgt_pltfrm: na
1212
ms.workload: infrastructure-services
1313
ms.date: 01/04/2021
14-
ms.author: damendo
14+
ms.author: harshacs
1515

1616
---
1717

@@ -368,7 +368,12 @@ Also, when a NSG is deleted, by default the associated flow log resource is dele
368368

369369
**Flow Logging Costs**: NSG flow logging is billed on the volume of logs produced. High traffic volume can result in large flow log volume and the associated costs. NSG Flow log pricing does not include the underlying costs of storage. Using the retention policy feature with NSG Flow Logging means incurring separate storage costs for extended periods of time. If you want to retain data forever and do not want to apply any retention policy, set retention (days) to 0. For more information, see [Network Watcher Pricing](https://azure.microsoft.com/pricing/details/network-watcher/) and [Azure Storage Pricing](https://azure.microsoft.com/pricing/details/storage/) for additional details.
370370

371-
**Issues with User-defined Inbound TCP rules**: [Network Security Groups (NSGs)](../virtual-network/network-security-groups-overview.md) are implemented as a [Stateful firewall](https://en.wikipedia.org/wiki/Stateful_firewall?oldformat=true). However, due to current platform limitations, user-defined rules that affect inbound TCP flows are implemented in a stateless fashion. Due to this, flows affected by user-defined inbound rules become non-terminating. Additionally byte and packet counts are not recorded for these flows. Consequently the number of bytes and packets reported in NSG Flow Logs (and Traffic Analytics) could be different from actual numbers. This can be resolved by setting the [FlowTimeoutInMinutes](/powershell/module/az.network/set-azvirtualnetwork) property on the associated virtual networks to a non-null value.
371+
**Issues with User-defined Inbound TCP rules**: [Network Security Groups (NSGs)](../virtual-network/network-security-groups-overview.md) are implemented as a [Stateful firewall](https://en.wikipedia.org/wiki/Stateful_firewall?oldformat=true). However, due to current platform limitations, user-defined rules that affect inbound TCP flows are implemented in a stateless fashion. Due to this, flows affected by user-defined inbound rules become non-terminating. Additionally byte and packet counts are not recorded for these flows. Consequently the number of bytes and packets reported in NSG Flow Logs (and Traffic Analytics) could be different from actual numbers. This can be resolved by setting the [FlowTimeoutInMinutes](/powershell/module/az.network/set-azvirtualnetwork) property on the associated virtual networks to a non-null value. Default stateful behavior can be achieved by setting FlowTimeoutInMinutes to 4 minutes. For long running connections, where you do not want flows disconnecting from a service or destination, FlowTimeoutInMinutes can be set to a value upto 30 minutes.
372+
```powershell
373+
$virtualNetwork = Get-AzVirtualNetwork -Name VnetName -ResourceGroupName RgName
374+
$virtualNetwork.FlowTimeoutInMinutes = 4
375+
$virtualNetwork | Set-AzVirtualNetwork
376+
```
372377

373378
**Inbound flows logged from internet IPs to VMs without public IPs**: VMs that don't have a public IP address assigned via a public IP address associated with the NIC as an instance-level public IP, or that are part of a basic load balancer back-end pool, use [default SNAT](../load-balancer/load-balancer-outbound-connections.md) and have an IP address assigned by Azure to facilitate outbound connectivity. As a result, you might see flow log entries for flows from internet IP addresses, if the flow is destined to a port in the range of ports assigned for SNAT. While Azure won't allow these flows to the VM, the attempt is logged and appears in Network Watcher's NSG flow log by design. We recommend that unwanted inbound internet traffic be explicitly blocked with NSG.
374379

0 commit comments

Comments
 (0)