You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There are a few ways to verify the update was successful, but you can navigate to firewall **Overview** and select **JSON view** on the top right corner. Here’s an example:
41
41
42
42
:::image type="content" source="media/enable-top-ten-and-flow-trace/firewall-log-verification.png" alt-text="Screenshot of JSON showing additional log verification.":::
43
43
44
-
### Create a Diagnostic setting and enable Resource Specific Table
44
+
### Create a diagnostic setting and enable Resource Specific Table
45
45
46
46
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
47
47
2. Type a Diagnostic setting name.
48
48
3. Select **Azure Firewall Fat Flow Log** under **Categories** and any other logs you want to be supported in the firewall.
49
49
4. In Destination details, select **Send to Log Analytics** workspace
50
-
1. Choose your desired Subscription and preconfigured Log Analytics worbkspace.
50
+
1. Choose your desired Subscription and preconfigured Log Analytics workspace.
1.In Firewall resource, navigate to Logs under the Monitoring tab.
57
-
2. Select **Queries** then load **Azure Firewall Top Flow Logs** by hovering over the option and selecting **Load to editor**.
56
+
1.On a firewall resource, navigate to **Logs** under the **Monitoring** tab.
57
+
2. Select **Queries**, then load **Azure Firewall Top Flow Logs** by hovering over the option and selecting **Load to editor**.
58
58
3. When the query loads, select **Run**.
59
59
60
60
:::image type="content" source="media/enable-top-ten-and-flow-trace/top-ten-flow-log.png" alt-text="Screenshot showing the Top 10 flow log." lightbox="media/enable-top-ten-and-flow-trace/top-ten-flow-log.png":::
@@ -64,9 +64,9 @@ There are a few ways to verify the update was successful, but you can navigate t
64
64
Currently, the firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *syn* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing has occurred.
65
65
66
66
The following additional properties can be added:
67
-
- SYN, ACK
67
+
- SYN-ACK
68
68
- FIN
69
-
- FIN, ACK
69
+
- FIN-ACK
70
70
- RST
71
71
- INVALID (flows)
72
72
@@ -85,7 +85,7 @@ Select-AzSubscription -Subscription <subscription_id> or <subscription_name>
0 commit comments