Skip to content

Commit b27d1b9

Browse files
Merge pull request #229073 from halkazwini/nw-nsg-flow3
tweaks
2 parents f3c4536 + bef23e5 commit b27d1b9

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

articles/network-watcher/network-watcher-nsg-flow-logging-overview.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: template-concept, engagement-fy23
1414

1515
# Flow logs for network security groups
1616

17-
NSG flow logs is a feature of Azure Network Watcher that allows you to log information about IP traffic flowing through a [network security group (NSG)](../virtual-network/network-security-groups-overview.md). Flow data is sent to Azure Storage accounts. From there, you can access the data and export it to any visualization tool, security information and event management (SIEM) solution, or intrusion detection system (IDS) of your choice.
17+
NSG flow logs is a feature of Azure Network Watcher that allows you to log information about IP traffic flowing through a [network security group (NSG)](../virtual-network/network-security-groups-overview.md). Flow data is sent to Azure Storage from where you can access it and export it to any visualization tool, security information and event management (SIEM) solution, or intrusion detection system (IDS) of your choice.
1818

1919
:::image type="content" source="./media/network-watcher-nsg-flow-logging-overview/nsg-flow-logs-portal.png" alt-text="Screenshot showing Network Watcher NSG flow logs page in the Azure portal.":::
2020

@@ -65,15 +65,15 @@ Core concepts for flow logs include:
6565
- All traffic flows in your network are evaluated through the rules in the applicable network security group. The result of these evaluations is NSG flow logs.
6666
- NSG flow logs are collected through the Azure platform and don't require any change to your Azure resources.
6767
- There are two types of network security group rules: terminating and non-terminating. Each has different logging behaviors:
68-
- *Deny* rules are terminating. The network security group that's denying the traffic will log it in the flow logs. Processing in this case stops after any NSG denies traffic.
69-
- *Allow* rules are non-terminating. If the network security group allows the traffic, processing continues to the next network security group. The last network security group that allows traffic will log the traffic to the flow logs.
68+
- *Deny* rules are terminating. The network security group that's denying the traffic logs it in the flow logs. Processing in this case stops after any NSG denies traffic.
69+
- *Allow* rules are non-terminating. If the network security group allows the traffic, processing continues to the next network security group. The last network security group that allows traffic logs the traffic to the flow logs.
7070
- NSG flow logs are written to storage accounts. You can export, process, analyze, and visualize NSG flow logs by using tools like Network Watcher traffic analytics, Splunk, Grafana, and Stealthwatch.
7171

7272
## Log format
7373

7474
NSG flow logs include the following properties:
7575

76-
* `time`: Time when the event was logged.
76+
* `time`: Time in UTC when the event was logged.
7777
* `systemId`: System ID of the network security group.
7878
* `category`: Category of the event. The category is always `NetworkSecurityGroupFlowEvent`.
7979
* `resourceid`: Resource ID of the network security group.
@@ -84,23 +84,23 @@ NSG flow logs include the following properties:
8484
* `rule`: Rule for which the flows are listed.
8585
* `flows`: Collection of flows.
8686
* `mac`: MAC address of the NIC for the VM where the flow was collected.
87-
* `flowTuples`: String that contains multiple properties for the flow tuple in comma-separated format:
88-
* `Time Stamp`: Time stamp of when the flow occurred, in UNIX epoch format.
87+
* `flowTuples`: String that contains multiple properties for the flow tuple in a comma-separated format:
88+
* `Time stamp`: Time stamp of when the flow occurred in UNIX epoch format.
8989
* `Source IP`: Source IP address.
9090
* `Destination IP`: Destination IP address.
91-
* `Source Port`: Source port.
92-
* `Destination Port`: Destination port.
91+
* `Source port`: Source port.
92+
* `Destination port`: Destination port.
9393
* `Protocol`: Protocol of the flow. Valid values are `T` for TCP and `U` for UDP.
94-
* `Traffic Flow`: Direction of the traffic flow. Valid values are `I` for inbound and `O` for outbound.
95-
* `Traffic Decision`: Whether traffic was allowed or denied. Valid values are `A` for allowed and `D` for denied.
94+
* `Traffic flow`: Direction of the traffic flow. Valid values are `I` for inbound and `O` for outbound.
95+
* `Traffic decision`: Whether traffic was allowed or denied. Valid values are `A` for allowed and `D` for denied.
9696
* `Flow State - Version 2 Only`: State of the flow. Possible states are:
9797
* `B`: Begin, when a flow is created. Statistics aren't provided.
9898
* `C`: Continuing for an ongoing flow. Statistics are provided at 5-minute intervals.
9999
* `E`: End, when a flow is terminated. Statistics are provided.
100-
* `Packets - Source to destination - Version 2 Only`: Total number of TCP packets sent from source to destination since the last update.
101-
* `Bytes sent - Source to destination - Version 2 Only`: Total number of TCP packet bytes sent from source to destination since the last update. Packet bytes include the packet header and payload.
102-
* `Packets - Destination to source - Version 2 Only`: Total number of TCP packets sent from destination to source since the last update.
103-
* `Bytes sent - Destination to source - Version 2 Only`: Total number of TCP packet bytes sent from destination to source since the last update. Packet bytes include packet header and payload.
100+
* `Packets sent - Version 2 Only`: Total number of TCP packets sent from source to destination since the last update.
101+
* `Bytes sent - Version 2 Only`: Total number of TCP packet bytes sent from source to destination since the last update. Packet bytes include the packet header and payload.
102+
* `Packets received - Version 2 Only`: Total number of TCP packets sent from destination to source since the last update.
103+
* `Bytes received - Version 2 Only`: Total number of TCP packet bytes sent from destination to source since the last update. Packet bytes include packet header and payload.
104104

105105
Version 2 of NSG flow logs introduces the concept of flow state. You can configure which version of flow logs you receive.
106106

@@ -511,5 +511,5 @@ Storage of logs is charged separately. For relevant prices, see [Azure Blob Stor
511511

512512
## Next steps
513513

514-
- Learn how to [Log network traffic to and from a virtual machine using the Azure portal](./network-watcher-nsg-flow-logging-portal.md)
514+
- Learn how to [Log network traffic to and from a virtual machine](./network-watcher-nsg-flow-logging-portal.md)
515515
- Learn how to [Read NSG flow logs](./network-watcher-read-nsg-flow-logs.md)

0 commit comments

Comments
 (0)