Skip to content

Commit b6177f9

Browse files
Merge pull request #214698 from ankitaduttaMSFT/14Oct-NWFixes
acrolinx suggested edits
2 parents 6aecb3f + 063da7e commit b6177f9

6 files changed

+32
-29
lines changed

articles/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ When you ran the `az network watcher test-ip-flow` command to test outbound comm
200200
}
201201
```
202202

203-
The rule lists **0.0.0.0/0** as the **destinationAddressPrefix**. The rule denies the outbound communication to 172.131.0.100, because the address is not within the **destinationAddressPrefix** of any of the other outbound rules in the output from the `az network nic list-effective-nsg` command. To allow the outbound communication, you could add a security rule with a higher priority, that allows outbound traffic to port 80 at 172.131.0.100.
203+
The rule lists **0.0.0.0/0** as the **destinationAddressPrefix**. The rule denies the outbound communication to 172.131.0.100 because the address is not within the **destinationAddressPrefix** of any of the other outbound rules in the output from the `az network nic list-effective-nsg` command. To allow the outbound communication, you could add a security rule with a higher priority, that allows outbound traffic to port 80 at 172.131.0.100.
204204

205205
When you ran the `az network watcher test-ip-flow` command in [Use IP flow verify](#use-ip-flow-verify) to test inbound communication from 172.131.0.100, the output informed you that the **DenyAllInBound** rule denied the communication. The **DenyAllInBound** rule equates to the **DenyAllInBound** rule listed in the following output from the `az network nic list-effective-nsg` command:
206206

@@ -235,7 +235,7 @@ When you ran the `az network watcher test-ip-flow` command in [Use IP flow verif
235235

236236
The **DenyAllInBound** rule is applied because, as shown in the output, no other higher priority rule exists in the output from the `az network nic list-effective-nsg` command that allows port 80 inbound to the VM from 172.131.0.100. To allow the inbound communication, you could add a security rule with a higher priority that allows port 80 inbound from 172.131.0.100.
237237

238-
The checks in this quickstart tested Azure configuration. If the checks return expected results and you still have network problems, ensure that you don't have a firewall between your VM and the endpoint you're communicating with and that the operating system in your VM doesn't have a firewall that is allowing or denying communication.
238+
The checks in this quickstart tested Azure configuration. If the checks return the expected results and you still have network problems, ensure that you don't have a firewall between your VM and the endpoint you're communicating with and that the operating system in your VM doesn't have a firewall that is allowing or denying communication.
239239

240240
## Clean up resources
241241

articles/network-watcher/network-watcher-nsg-flow-logging-azure-resource-manager.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,11 +107,11 @@ Below are two examples of complete templates to set up NSG Flow Logs.
107107
```
108108

109109
> [!NOTE]
110-
> * The name of resource has the format "Parent Resource_Child resource". Here, the parent resource is the regional Network Watcher instance (Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centraluseuap)
110+
> * The name of the resource has the format "Parent Resource_Child resource". Here, the parent resource is the regional Network Watcher instance (Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centraluseuap)
111111
> * targetResourceId is the resource ID of the target NSG
112112
> * storageId is the resource ID of the destination storage account
113113
114-
**Example 2**: The following templates enabling NSG Flow Logs (version 2) with a retention for 5 days. Enabling Traffic Analytics with a processing interval of 10 minutes.
114+
**Example 2**: The following templates enable NSG Flow Logs (version 2) with retention for 5 days. Enabling Traffic Analytics with a processing interval of 10 minutes.
115115

116116
```json
117117
{

articles/network-watcher/network-watcher-nsg-flow-logging-cli.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,13 @@ ms.author: damendo
2020
> - [Azure CLI](network-watcher-nsg-flow-logging-cli.md)
2121
> - [REST API](network-watcher-nsg-flow-logging-rest.md)
2222
23-
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in json format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
23+
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in JSON format and show outbound and inbound flows on a per rule basis. The NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
2424

2525
To perform the steps in this article, you need to [install the Azure CLI](/cli/azure/install-azure-cli) for Windows, Linux, or macOS. The detailed specification of all flow logs commands can be found [here](/cli/azure/network/watcher/flow-log)
2626

2727
## Register Insights provider
2828

29-
In order for flow logging to work successfully, the **Microsoft.Insights** provider must be registered. If you are not sure if the **Microsoft.Insights** provider is registered, run the following script.
29+
In order for flow logging to work successfully, the **Microsoft.Insights** provider must be registered. If you aren't sure if the **Microsoft.Insights** provider is registered, run the following script.
3030

3131
```azurecli
3232
az provider register --namespace Microsoft.Insights

articles/network-watcher/network-watcher-nsg-flow-logging-powershell.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: devx-track-azurepowershell
1919
> - [Azure CLI](network-watcher-nsg-flow-logging-cli.md)
2020
> - [REST API](network-watcher-nsg-flow-logging-rest.md)
2121
22-
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in json format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
22+
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in JSON format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
2323

2424
The detailed specification of all NSG flow logs commands for various versions of AzPowerShell can be found [here](/powershell/module/az.network/#network-watcher)
2525

@@ -30,7 +30,7 @@ The detailed specification of all NSG flow logs commands for various versions of
3030
3131
## Register Insights provider
3232

33-
In order for flow logging to work successfully, the **Microsoft.Insights** provider must be registered. If you are not sure if the **Microsoft.Insights** provider is registered, run the following script.
33+
In order for flow logging to work successfully, the **Microsoft.Insights** provider must be registered. If you aren't sure if the **Microsoft.Insights** provider is registered, run the following script.
3434

3535
```powershell
3636
Register-AzResourceProvider -ProviderNamespace Microsoft.Insights
@@ -64,7 +64,7 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcher $NW -TargetResourceId $nsg.Id
6464
Get-AzNetworkWatcherFlowLogStatus -NetworkWatcher $NW -TargetResourceId $nsg.Id
6565
```
6666

67-
The storage account you specify cannot have network rules configured for it that restrict network access to only Microsoft services or specific virtual networks. The storage account can be in the same, or a different Azure subscription, than the NSG that you enable the flow log for. If you use different subscriptions, they must both be associated to the same Azure Active Directory tenant. The account you use for each subscription must have the [necessary permissions](required-rbac-permissions.md).
67+
The storage account you specify cannot have network rules configured for it that restrict network access to only Microsoft services or specific virtual networks. The storage account can be in the same, or a different Azure subscription, than the NSG that you enable the flow log for. If you use different subscriptions, they must both be associated with the same Azure Active Directory tenant. The account you use for each subscription must have the [necessary permissions](required-rbac-permissions.md).
6868

6969
## Disable Traffic Analytics and Network Security Group Flow logs
7070

@@ -92,6 +92,6 @@ For information about the structure of the log visit [Network Security Group Flo
9292

9393
## Next Steps
9494

95-
Learn how to [Visualize your NSG flow logs with PowerBI](network-watcher-visualize-nsg-flow-logs-power-bi.md)
95+
Learn how to [Visualize your NSG flow logs with Power BI](network-watcher-visualize-nsg-flow-logs-power-bi.md)
9696

9797
Learn how to [Visualize your NSG flow logs with open source tools](network-watcher-visualize-nsg-flow-logs-open-source-tools.md)

articles/network-watcher/network-watcher-nsg-flow-logging-rest.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ ms.author: damendo
2323
> - [Azure CLI](network-watcher-nsg-flow-logging-cli.md)
2424
> - [REST API](network-watcher-nsg-flow-logging-rest.md)
2525
26-
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in json format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
26+
Network Security Group flow logs are a feature of Network Watcher that allows you to view information about ingress and egress IP traffic through a Network Security Group. These flow logs are written in JSON format and show outbound and inbound flows on a per rule basis, the NIC the flow applies to, 5-tuple information about the flow (Source/Destination IP, Source/Destination Port, Protocol), and if the traffic was allowed or denied.
2727

2828
## Before you begin
2929

3030
ARMclient is used to call the REST API using PowerShell. ARMClient is found on chocolatey at [ARMClient on Chocolatey](https://chocolatey.org/packages/ARMClient). The detailed specifications of NSG flow logs REST API can be found [here](/rest/api/network-watcher/flowlogs)
3131

32-
This scenario assumes you have already followed the steps in [Create a Network Watcher](network-watcher-create.md) to create a Network Watcher.
32+
This scenario assumes you've already followed the steps in [Create a Network Watcher](network-watcher-create.md) to create a Network Watcher.
3333

3434
> [!Important]
3535
> For Network Watcher REST API calls the resource group name in the request URI is the resource group that contains the Network Watcher, not the resources you are performing the diagnostic actions on.
@@ -54,7 +54,7 @@ armclient login
5454

5555
## Register Insights provider
5656

57-
In order for flow logging to work successfully, the **Microsoft.Insights** provider must be registered. If you are not sure if the **Microsoft.Insights** provider is registered, run the following script.
57+
In order for flow logging to work successfully, the **Microsoft.Insights** provider must be registered. If you aren't sure if the **Microsoft.Insights** provider is registered, run the following script.
5858

5959
```powershell
6060
$subscriptionId = "00000000-0000-0000-0000-000000000000"
@@ -63,7 +63,7 @@ armclient post "https://management.azure.com//subscriptions/${subscriptionId}/pr
6363

6464
## Enable Network Security Group flow logs
6565

66-
The command to enable flow logs version 2 is shown in the following example. For version 1 replace the 'version' field with '1':
66+
The command to enable flow logs version 2 is shown in the following example. For version 1, replace the 'version' field with '1':
6767

6868
```powershell
6969
$subscriptionId = "00000000-0000-0000-0000-000000000000"
@@ -112,8 +112,8 @@ The response returned from the preceding example is as follows:
112112
}
113113
```
114114
> [!NOTE]
115-
> - The api [Network Watchers - Set Flow Log Configuration](/rest/api/network-watcher/network-watchers/set-flow-log-configuration) used above is old and may soon be deprecated.
116-
> - It is recommended to use the new [Flow Logs - Create Or Update](/rest/api/network-watcher/flow-logs/create-or-update) rest api instead.
115+
> - The API [Network Watchers - Set Flow Log Configuration](/rest/api/network-watcher/network-watchers/set-flow-log-configuration) used above is old and may soon be deprecated.
116+
> - It is recommended to use the new [Flow Logs - Create Or Update](/rest/api/network-watcher/flow-logs/create-or-update) rest API instead.
117117
118118
## Disable Network Security Group flow logs
119119

@@ -188,7 +188,7 @@ $requestBody = @"
188188
armclient post "https://management.azure.com/subscriptions/${subscriptionId}/ResourceGroups/${resourceGroupName}/providers/Microsoft.Network/networkWatchers/${networkWatcherName}/queryFlowLogStatus?api-version=2016-12-01" $requestBody
189189
```
190190

191-
The following is an example of the response returned:
191+
The following example shows the response returned:
192192

193193
```json
194194
{
@@ -224,6 +224,6 @@ https://{storageAccountName}.blob.core.windows.net/insights-logs-networksecurity
224224

225225
## Next steps
226226

227-
Learn how to [Visualize your NSG flow logs with PowerBI](network-watcher-visualize-nsg-flow-logs-power-bi.md)
227+
Learn how to [Visualize your NSG flow logs with Power BI](network-watcher-visualize-nsg-flow-logs-power-bi.md)
228228

229229
Learn how to [Visualize your NSG flow logs with open source tools](network-watcher-visualize-nsg-flow-logs-open-source-tools.md)

articles/network-watcher/nsg-flow-logs-policy-portal.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,20 @@ ms.author: damendo
1919
# QuickStart: Deploy and manage NSG Flow Logs using Azure Policy
2020

2121
## Overview
22-
Azure Policy helps to enforce organizational standards and to assess compliance at-scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we will use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
22+
23+
Azure Policy helps to enforce organizational standards and to assess compliance at scale. Common use cases for Azure Policy include implementing governance for resource consistency, regulatory compliance, security, cost, and management. In this article, we will use two built-in policies available for NSG Flow Logs to manage your flow logs setup. The first policy flags any NSGs without flow logs enabled. The second policy automatically deploys Flow logs for NSGs without Flow logs enabled.
2324

2425
If you are creating an Azure Policy definition for the first time, you can read through:
2526
- [Azure Policy overview](../governance/policy/overview.md)
2627
- [Tutorial for creating an Azure Policy assignment](../governance/policy/assign-policy-portal.md#create-a-policy-assignment).
2728

2829

2930
## Locate the policies
31+
3032
1. Go to the Azure portal – [portal.azure.com](https://portal.azure.com)
3133

32-
Navigate to Azure Policy page by searching for Policy in the top search bar
34+
Navigate to the Azure Policy page by searching for Policy in the top search bar
35+
3336
![Policy Home Page](./media/network-watcher-builtin-policy/1_policy-search.png)
3437

3538
2. Head over to the **Assignments** tab from the left pane
@@ -66,13 +69,13 @@ If you want to see the full definition of the policy, you can visit the [Definit
6669

6770
1. Fill in your policy details
6871

69-
- Scope: A subscription is the common choice, you can also choose a management group or resource group as relevant to you.
72+
- Scope: A subscription is a common choice, you can also choose a management group or resource group as relevant to you.
7073
- Policy Definition: Should be chosen as shown in the "Locate the policies" section.
7174
- AssignmentName: Choose a descriptive name
7275

7376
2. Click on "Review + Create" to review your assignment
7477

75-
The policy does not require any parameters. As you are assigning an audit policy, you do not need to fill the details in the "Remediation" tab.
78+
The policy does not require any parameters. As you are assigning an audit policy, you do not need to fill in the details in the "Remediation" tab.
7679

7780
![Audit Policy Review](./media/network-watcher-builtin-policy/5_1_audit-policy-review.png)
7881

@@ -95,7 +98,7 @@ If you want to see the full definition of the policy, you can visit the [Definit
9598

9699
1. Fill in your policy details
97100

98-
- Scope: A subscription is the common choice, you can also choose a management group or resource group as relevant to you.
101+
- Scope: A subscription is a common choice, you can also choose a management group or resource group as relevant to you.
99102
- Policy Definition: Should be chosen as shown in the "Locate the policies" section.
100103
- AssignmentName: Choose a descriptive name
101104

@@ -104,17 +107,17 @@ If you want to see the full definition of the policy, you can visit the [Definit
104107
The Network Watcher service is a regional service. These parameters allow the policy action of deploying flow logs to be executed.
105108
- NSG Region: Azure regions at which the policy is targeted
106109
- Storage ID: Full resource ID of the storage account. Note: This storage account should be in the same region as the NSG.
107-
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you have not renamed it, you can enter 'NetworkWatcherRG' which is the default.
110+
- Network Watchers RG: Name of the resource group containing your Network Watcher resource. If you have not renamed it, you can enter `NetworkWatcherRG` which is the default.
108111
- Network Watcher name: Name of the regional network watcher service. Format: NetworkWatcher_RegionName. Example: NetworkWatcher_centralus. See the full list.
109112

110113
![DINE Policy parameters](./media/network-watcher-builtin-policy/5_2_1_dine-policy-details-alt.png)
111114

112115
3. Add Remediation details
113116

114-
- Check mark on "Create Remediation task" if you want the policy to affect existing resources
115-
- "Create a Managed Identity" should be already checked
116-
- Selected the same location as previous for your Managed Identity
117-
- You will need Contributor or Owner permissions to use this policy. If you have these permissions, you should not see any errors.
117+
- Check mark on **Create Remediation task** if you want the policy to affect existing resources
118+
- **Create a Managed Identity** should be already checked
119+
- Select the same location as previous for your Managed Identity
120+
- You will need Contributor or Owner permission to use this policy. If you have these permissions, you should not see any errors.
118121

119122
![DINE Policy remediation](./media/network-watcher-builtin-policy/5_2_2_dine-remediation.png)
120123

@@ -127,7 +130,7 @@ You should see something similar to the following screenshot.
127130
### Results
128131

129132
To check the results, open the Compliance tab and search for the name of your Assignment.
130-
You should see something like following screenshot once your policy. In case your policy hasn't run, wait for some time.
133+
You should see something like the following screenshot once your policy. In case your policy hasn't run, wait for some time.
131134

132135
![DINE Policy results](./media/network-watcher-builtin-policy/7_2_dine-policy-results.png)
133136

0 commit comments

Comments
 (0)