You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/connection-monitor.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,9 +75,9 @@ Complete the steps in [Create the first VM](#create-the-first-vm) again, with th
75
75
76
76
|Step|Setting|Value|
77
77
|---|---|---|
78
-
| 1 | Select a version of **Ubuntu Server**||
78
+
| 1 | Select a version of the **Ubuntu Server**||
79
79
| 3 | Name | myVm2 |
80
-
| 3 | Authentication type | Paste your SSH public key or select **Password**, and enter a password. |
80
+
| 3 | Authentication type | Paste your SSH public key or select **Password** and enter a password. |
81
81
| 3 | Resource group | Select **Use existing** and select **myResourceGroup**. |
82
82
| 6 | Extensions |**Network Watcher Agent for Linux**|
83
83
@@ -128,14 +128,14 @@ Create a connection monitor to monitor communication over TCP port 22 from *myVm
128
128
129
129
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. A generated alert can automatically run one or more actions, such as to notify someone or start another process. When setting an alert rule, the resource that you target determines the list of available metrics that you can use to generate alerts.
130
130
131
-
1. In Azure portal, select the **Monitor** service, and then select **Alerts** > **New alert rule**.
132
-
2. Click **Select target**, and then select the resources that you want to target. Select the **Subscription**, and set **Resource type** to filter down to the Connection Monitor that you want to use.
131
+
1. In the Azure portal, select the **Monitor** service, and then select **Alerts** > **New alert rule**.
132
+
2. Click **Select target**, and then select the resources that you want to target. Select the **Subscription**, and set the **Resource type** to filter down to the Connection Monitor that you want to use.
133
133
134
134

135
-
1. Once you have selected a resource to target, select **Add criteria**.The Network Watcher has [metrics on which you can create alerts](../azure-monitor/alerts/alerts-metric-near-real-time.md#metrics-and-dimensions-supported). Set **Available signals** to the metrics ProbesFailedPercent and AverageRoundtripMs:
135
+
1. Once you have selected a resource to target, select **Add criteria**.The Network Watcher has [metrics on which you can create alerts](../azure-monitor/alerts/alerts-metric-near-real-time.md#metrics-and-dimensions-supported). Set **Available signals** to the metrics ProbesFailedPercent and AverageRoundtripMs:
136
136
137
137

138
-
1. Fill out the alert details like alert rule name, description and severity. You can also add an action group to the alert to automate and customize the alert response.
138
+
1. Fill out the alert details like alert rule name, description, and severity. You can also add an action group to the alert to automate and customize the alert response.
139
139
140
140
## View a problem
141
141
@@ -156,7 +156,7 @@ By default, Azure allows communication over all ports between VMs in the same vi
156
156
| Priority | 100 |
157
157
| Name | DenySshInbound |
158
158
159
-
5. Since connection monitor probes at 60-second intervals, wait a few minutes and then on the left side of the portal, select **Network Watcher**, then **Connection monitor**, and then select the **myVm1-myVm2(22)** monitor again. The results are different now, as shown in the following picture:
159
+
5. Since connection monitor probes at 60-second intervals, wait a few minutes, and then on the left side of the portal, select **Network Watcher**, then **Connection monitor**, and then select the **myVm1-myVm2(22)** monitor again. The results are different now, as shown in the following picture:
Copy file name to clipboardExpand all lines: articles/network-watcher/diagnose-vm-network-routing-problem.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,8 +40,8 @@ Log in to the Azure portal at https://portal.azure.com.
40
40
41
41
## Create a VM
42
42
43
-
1. Select **+ Create a resource** found on the upper, left corner of the Azure portal.
44
-
2. Select **Compute**, and then select **Windows Server 2016 Datacenter** or **Ubuntu Server 17.10 VM**.
43
+
1. Select **+ Create a resource** found on the upper-left corner of the Azure portal.
44
+
2. Select **Compute** and then select **Windows Server 2016 Datacenter** or **Ubuntu Server 17.10 VM**.
45
45
3. Enter, or select, the following information, accept the defaults for the remaining settings, and then select **OK**:
46
46
47
47
|Setting|Value|
@@ -76,7 +76,7 @@ If you already have a network watcher enabled in at least one region, skip to [U
76
76
77
77
Azure automatically creates routes to default destinations. You may create custom routes that override the default routes. Sometimes, custom routes can cause communication to fail. Use the next hop capability of Network Watcher to determine which route Azure is using to route traffic.
78
78
79
-
1. In the Azure portal, select **Next hop**, under **Network Watcher**.
79
+
1. In the Azure portal, select **Next hop** under **Network Watcher**.
80
80
2. Select your subscription, enter or select the following values, and then select **Next hop**, as shown in the picture that follows:
81
81
82
82
|Setting |Value |
@@ -89,9 +89,9 @@ Azure automatically creates routes to default destinations. You may create custo
After a few seconds, the result informs you that the next hop type is **Internet**, and that the **Route table ID** is **System Route**. This result lets you know that there is a valid system route to the destination.
92
+
After a few seconds, the result informs you that the next hop type is **Internet** and that the **Route table ID** is **System Route**. This result lets you know that there is a valid system route to the destination.
93
93
94
-
3. Change the **Destination IP address** to *172.31.0.100* and select **Next hop** again. The result returned informs you that **None** is the **Next hop type**, and that the **Route table ID** is also **System Route**. This result lets you know that, while there is a valid system route to the destination, there is no next hop to route the traffic to the destination.
94
+
3. Change the **Destination IP address** to *172.31.0.100* and select **Next hop** again. The result returned informs you that **None** is the **Next hop type** and that the **Route table ID** is also **System Route**. This result lets you know that, while there is a valid system route to the destination, there is no next hop to route the traffic to the destination.
95
95
96
96
## View details of a route
97
97
@@ -100,9 +100,9 @@ Azure automatically creates routes to default destinations. You may create custo
When you ran the test using 13.107.21.200 in [Use next hop](#use-next-hop), the route with the address prefix 0.0.0.0/0 was used to route traffic to the address, since no other route includes the address. By default, all addresses not specified within the address prefix of another route are routed to the internet.
103
+
When you ran the test using 13.107.21.200 in [Use next hop](#use-next-hop), the route with the address prefix 0.0.0.0/0 was used to route traffic to the address since no other route includes the address. By default, all addresses not specified within the address prefix of another route are routed to the internet.
104
104
105
-
When you ran the test using 172.31.0.100 however, the result informed you that there was no next hop type. As you can see in the previous picture, though there is a default route to the 172.16.0.0/12 prefix, which includes the 172.31.0.100 address, the **NEXT HOP TYPE** is **None**. Azure creates a default route to 172.16.0.0/12, but doesn't specify a next hop type until there is a reason to. If, for example, you added the 172.16.0.0/12 address range to the address space of the virtual network, Azure changes the **NEXT HOP TYPE** to **Virtual network** for the route. A check would then show **Virtual network** as the **NEXT HOP TYPE**.
105
+
When you ran the test using 172.31.0.100, however, the result informed you that there was no next hop type. As you can see in the previous picture, though there is a default route to the 172.16.0.0/12 prefix, which includes the 172.31.0.100 address, the **NEXT HOP TYPE** is **None**. Azure creates a default route to 172.16.0.0/12 but doesn't specify a next hop type until there is a reason to. If, for example, you added the 172.16.0.0/12 address range to the address space of the virtual network, Azure changes the **NEXT HOP TYPE** to **Virtual network** for the route. A check would then show the**Virtual network** as the **NEXT HOP TYPE**.
Copy file name to clipboardExpand all lines: articles/network-watcher/quickstart-configure-network-security-group-flow-logs-from-arm-template.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ If there were issues with the deployment, see [Troubleshoot common Azure deploym
70
70
71
71
## Clean up resources
72
72
73
-
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
73
+
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in the complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
74
74
75
75
You also can disable an NSG flow log in the Azure portal:
Copy file name to clipboardExpand all lines: articles/network-watcher/quickstart-configure-network-security-group-flow-logs-from-bicep.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ If there were issues with the deployment, see [Troubleshoot common Azure deploym
79
79
80
80
## Clean up resources
81
81
82
-
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
82
+
You can delete Azure resources by using complete deployment mode. To delete a flow logs resource, specify a deployment in the complete mode without including the resource you want to delete. Read more about [complete deployment mode](../azure-resource-manager/templates/deployment-modes.md#complete-mode).
83
83
84
84
You also can disable an NSG flow log in the Azure portal:
Copy file name to clipboardExpand all lines: includes/resource-manager-quickstart-bicep-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,4 +6,4 @@ ms.date: 09/27/2021
6
6
ms.author: jgao
7
7
---
8
8
9
-
[Bicep](../articles/azure-resource-manager/bicep/overview.md) is a domain-specific language (DSL) that uses declarative syntax to deploy Azure resources. It provides concise syntax, reliable type safety, and support for code reuse. Bicep offers the best authoring experience for your infrastructure-as-code solutions in Azure.
9
+
[Bicep](../articles/azure-resource-manager/bicep/overview.md) is a domain-specific language (DSL) that uses a declarative syntax to deploy Azure resources. It provides concise syntax, reliable type safety, and support for code reuse. Bicep offers the best authoring experience for your infrastructure-as-code solutions in Azure.
0 commit comments