Skip to content

Commit c17d618

Browse files
committed
tweaks
1 parent 91de93d commit c17d618

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/firewall/enable-top-ten-and-flow-trace.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -35,26 +35,26 @@ $firewall = Get-AzFirewall- ResourceGroupName <ResourceGroupName> -Name <Firewal
3535
$firewall.EnableFatFlowLogging = $true
3636
Set-AzFirewall -AzureFirewall $firewall
3737
```
38-
### Verify update
38+
### Verify the update
3939

4040
There are a few ways to verify the update was successful, but you can navigate to firewall **Overview** and select **JSON view** on the top right corner. Here’s an example:
4141

4242
:::image type="content" source="media/enable-top-ten-and-flow-trace/firewall-log-verification.png" alt-text="Screenshot of JSON showing additional log verification.":::
4343

44-
### Create a Diagnostic setting and enable Resource Specific Table
44+
### Create a diagnostic setting and enable Resource Specific Table
4545

4646
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
4747
2. Type a Diagnostic setting name.
4848
3. Select **Azure Firewall Fat Flow Log** under **Categories** and any other logs you want to be supported in the firewall.
4949
4. In Destination details, select **Send to Log Analytics** workspace
50-
1. Choose your desired Subscription and preconfigured Log Analytics worbkspace.
50+
1. Choose your desired Subscription and preconfigured Log Analytics workspace.
5151
1. Enable **Resource specific**.
5252
:::image type="content" source="media/enable-top-ten-and-flow-trace/log-destination-details.png" alt-text="Screenshot showing log destination details.":::
5353

5454
### View and analyze Azure Firewall logs
5555

56-
1. In Firewall resource, navigate to Logs under the Monitoring tab.
57-
2. Select **Queries** then load **Azure Firewall Top Flow Logs** by hovering over the option and selecting **Load to editor**.
56+
1. On a firewall resource, navigate to **Logs** under the **Monitoring** tab.
57+
2. Select **Queries**, then load **Azure Firewall Top Flow Logs** by hovering over the option and selecting **Load to editor**.
5858
3. When the query loads, select **Run**.
5959

6060
:::image type="content" source="media/enable-top-ten-and-flow-trace/top-ten-flow-log.png" alt-text="Screenshot showing the Top 10 flow log." lightbox="media/enable-top-ten-and-flow-trace/top-ten-flow-log.png":::
@@ -64,9 +64,9 @@ There are a few ways to verify the update was successful, but you can navigate t
6464
Currently, the firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *syn* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing has occurred.
6565

6666
The following additional properties can be added:
67-
- SYN, ACK
67+
- SYN-ACK
6868
- FIN
69-
- FIN, ACK
69+
- FIN-ACK
7070
- RST
7171
- INVALID (flows)
7272

@@ -85,7 +85,7 @@ Select-AzSubscription -Subscription <subscription_id> or <subscription_name>
8585
Register-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderNamespace Microsoft.Network
8686
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
8787
```
88-
### Create a Diagnostic setting and enable Resource Specific Table
88+
### Create a diagnostic setting and enable Resource Specific Table
8989

9090
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
9191
2. Type a Diagnostic setting name.
@@ -97,8 +97,8 @@ Register-AzResourceProvider -ProviderNamespace Microsoft.Network
9797

9898
### View and analyze Azure Firewall Flow trace logs
9999

100-
1. In Firewall resource, navigate to Logs under the Monitoring tab.
101-
2. Select **Queries** then load **Azure Firewall flow trace logs** by hovering over the option and selecting **Load to editor**.
100+
1. On a firewall resource, navigate to **Logs** under the **Monitoring** tab.
101+
2. Select **Queries**, then load **Azure Firewall flow trace logs** by hovering over the option and selecting **Load to editor**.
102102
3. When the query loads, select **Run**.
103103

104104
:::image type="content" source="media/enable-top-ten-and-flow-trace/trace-flow-logs.png" alt-text="Screenshot showing the Trace flow log." lightbox="media/enable-top-ten-and-flow-trace/trace-flow-logs.png":::

0 commit comments

Comments
 (0)