Skip to content

Commit b9b31c1

Browse files
authored
Merge pull request #218474 from AbdullahBell/Firewall-logs
Firewall: Monitor Azure Firewall logs and metrics
2 parents 2227b2a + 83004d2 commit b9b31c1

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

articles/firewall/firewall-diagnostics.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: how-to
8-
ms.date: 10/22/2021
8+
ms.date: 11/15/2022
99
ms.author: victorh
1010
#Customer intent: As an administrator, I want monitor Azure Firewall logs and metrics so that I can track firewall activity.
1111
---
@@ -44,6 +44,7 @@ It can take a few minutes for the data to appear in your logs after you complete
4444
8. Select your subscription.
4545
9. Select **Save**.
4646

47+
:::image type="content" source=".\media\tutorial-diagnostics\firewall-diagnostic-settings.png" alt-text="Screenshot of Firewall Diagnostic setting.":::
4748
## Enable diagnostic logging by using PowerShell
4849

4950
Activity logging is automatically enabled for every Resource Manager resource. Diagnostic logging must be enabled to start collecting the data available through those logs.
@@ -69,9 +70,8 @@ To enable diagnostic logging with PowerShell, use the following steps:
6970
Name = 'toLogAnalytics'
7071
ResourceId = '/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>'
7172
WorkspaceId = '/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>'
72-
Enabled = $true
7373
}
74-
Set-AzDiagnosticSetting @diagSettings
74+
New-AzDiagnosticSetting @diagSettings
7575
```
7676

7777
## Enable diagnostic logging by using the Azure CLI
@@ -98,8 +98,8 @@ To enable diagnostic logging with Azure CLI, use the following steps:
9898
az monitor diagnostic-settings create -n 'toLogAnalytics'
9999
--resource '/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/Microsoft.Network/azureFirewalls/<Firewall name>'
100100
--workspace '/subscriptions/<subscriptionId>/resourceGroups/<resource group name>/providers/microsoft.operationalinsights/workspaces/<workspace name>'
101-
--logs '[{\"category\":\"AzureFirewallApplicationRule\",\"Enabled\":true}, {\"category\":\"AzureFirewallNetworkRule\",\"Enabled\":true}, {\"category\":\"AzureFirewallDnsProxy\",\"Enabled\":true}]'
102-
--metrics '[{\"category\": \"AllMetrics\",\"enabled\": true}]'
101+
--logs "[{\"category\":\"AzureFirewallApplicationRule\",\"Enabled\":true}, {\"category\":\"AzureFirewallNetworkRule\",\"Enabled\":true}, {\"category\":\"AzureFirewallDnsProxy\",\"Enabled\":true}]"
102+
--metrics "[{\"category\": \"AllMetrics\",\"enabled\": true}]"
103103
```
104104

105105
## View and analyze the activity log
53.2 KB
Loading

0 commit comments

Comments
 (0)