Skip to content

Commit e9ad891

Browse files
Update templates.
1 parent 0184718 commit e9ad891

File tree

2 files changed

+63
-12
lines changed

2 files changed

+63
-12
lines changed

articles/virtual-wan/monitor-virtual-wan-reference.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,9 @@ The following table lists the metrics available for the Microsoft.Network/virtua
2626

2727
| Metric | Description|
2828
| --- | --- |
29-
| **Virtual Hub Data Processed** | Data on how much traffic traverses the virtual hub router in a given time period. Only the following flows use the virtual hub router: VNet to VNet (same hub and interhub) and VPN/ExpressRoute branch to VNet (interhub). If a virtual hub is secured with routing intent, then these flows traverse the firewall instead of the hub router. |
30-
| **Routing Infrastructure Units** | The virtual hub's routing infrastructure units (RIU). The virtual hub's RIU determines how much bandwidth the virtual hub router can process for flows traversing the virtual hub router. The hub's RIU also determines how many VMs in spoke VNets the virtual hub router can support. For more details on routing infrastructure units, see [Virtual Hub Capacity](hub-settings.md#capacity).
31-
| **Spoke VM Utilization** | The approximate number of deployed spoke VMs as a percentage of the total number of spoke VMs that the hub's routing infrastructure units can support. For example, if the hub's RIU is set to 2 (which supports 2000 spoke VMs), and 1000 VMs are deployed across spoke VNets, then this metric's value will be approximately 50%. |
32-
29+
| **Virtual Hub Data Processed** | Data on how much traffic traverses the virtual hub router in a given time period. Only the following flows use the virtual hub router: virtual network to virtual network, same hub and interhub, and VPN/ExpressRoute branch to virtual network, for interhub. If a virtual hub is secured with routing intent, then these flows traverse the firewall instead of the hub router. |
30+
| **Routing Infrastructure Units** | The virtual hub's routing infrastructure units (RIU). The virtual hub's RIU determines how much bandwidth the virtual hub router can process for flows traversing the virtual hub router. The hub's RIU also determines how many VMs in spoke VNets the virtual hub router can support. For more information on routing infrastructure units, see [Virtual Hub Capacity](hub-settings.md#capacity).
31+
| **Spoke VM Utilization** | The approximate number of deployed spoke VMs as a percentage of the total number of spoke VMs that the hub's routing infrastructure units can support. For example, if the hub's RIU is set to 2, which supports 2,000 spoke VMs, and 1,000 VMs are deployed across spoke virtual networks, this metric's value is approximately 50%. |
3332

3433
### <a name="s2s-metrics"></a>Supported metrics for microsoft.network/vpngateways
3534

@@ -64,7 +63,7 @@ The following table lists the metrics available for the microsoft.network/vpngat
6463
| **BGP Peer Status** | BGP connectivity status per peer and per instance.|
6564
| **BGP Routes Advertised** | Number of routes advertised per peer and per instance.|
6665
| **BGP Routes Learned** | Number of routes learned per peer and per instance.|
67-
| **VNET Address Prefix Count** | Number of VNet address prefixes that are used/advertised by the gateway.|
66+
| **VNET Address Prefix Count** | Number of virtual network address prefixes that the gateway uses and advertises.|
6867

6968
You can review per peer and instance metrics by selecting **Apply splitting** and choosing the preferred value.
7069

@@ -120,7 +119,7 @@ The following table lists the metrics available for the microsoft.network/expres
120119

121120
### ExpressRoute gateway diagnostics
122121

123-
In Azure Virtual WAN, ExpressRoute gateway metrics can be exported as logs via a diagnostic setting.
122+
In Azure Virtual WAN, ExpressRoute gateway metrics can be exported as logs by using a diagnostic setting.
124123

125124
[!INCLUDE [horz-monitor-ref-metrics-dimensions-intro](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-metrics-dimensions-intro.md)]
126125

@@ -168,20 +167,21 @@ The following diagnostics are available for Virtual WAN point-to-site VPN gatewa
168167
| --- | --- |
169168
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and other diagnostics. |
170169
| **IKE Diagnostic Logs** | IKE-specific diagnostics for IPsec connections.|
171-
| **P2S Diagnostic Logs** | These are User VPN P2S (Point-to-site) configuration and client events. They include client connect/disconnect, VPN client address allocation, and other diagnostics.|
170+
| **P2S Diagnostic Logs** | These events are User VPN P2S (Point-to-site) configuration and client events. They include client connect/disconnect, VPN client address allocation, and other diagnostics.|
172171

173172
### <a name="s2s-diagnostic"></a>Supported resource logs for microsoft.network/vpngateways
174173

175174
[!INCLUDE [microsoft.network/vpngateways](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/logs/microsoft-network-vpngateways-logs-include.md)]
176175

177176
| Metric | Description|
178177
| --- | --- |
179-
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and additional diagnostics.|
180-
| **Tunnel Diagnostic Logs** | These are IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and additional diagnostics. For connect and disconnect events, these logs also display the remote IP address of the corresponding on-premises VPN device.|
181-
| **Route Diagnostic Logs** | These are logs related to events for static routes, BGP, route updates, and additional diagnostics. |
178+
| **Gateway Diagnostic Logs** | Gateway-specific diagnostics such as health, configuration, service updates, and other diagnostics.|
179+
| **Tunnel Diagnostic Logs** | IPsec tunnel-related logs such as connect and disconnect events for a site-to-site IPsec tunnel, negotiated SAs, disconnect reasons, and other diagnostics. For connect and disconnect events, these logs also display the remote IP address of the corresponding on-premises VPN device.|
180+
| **Route Diagnostic Logs** | Logs related to events for static routes, BGP, route updates, and other diagnostics. |
182181
| **IKE Diagnostic Logs** | IKE-specific diagnostics for IPsec connections. |
183182

184183

184+
185185
[!INCLUDE [horz-monitor-ref-logs-tables](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-ref-logs-tables.md)]
186186

187187
### Virtual WAN Microsoft.Network/vpnGateways

articles/virtual-wan/monitor-virtual-wan.md

Lines changed: 53 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,6 @@ You can view metrics for Virtual WAN by using PowerShell. To query, use the foll
5959
$MetricInformation = Get-AzMetric -ResourceId "/subscriptions/<SubscriptionID>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Network/VirtualHubs/<VirtualHubName>" -MetricName "VirtualHubDataProcessed" -TimeGrain 00:05:00 -StartTime 2022-2-20T01:00:00Z -EndTime 2022-2-20T01:30:00Z -AggregationType Sum
6060
```
6161

62-
6362
```azurepowershell-interactive
6463
$MetricInformation.Data
6564
```
@@ -68,12 +67,29 @@ $MetricInformation.Data
6867
- **Metric Name**. Refers to the name of the metric you're querying, which in this case is called `VirtualHubDataProcessed`. This metric shows all the data that the virtual hub router processed in the selected time period of the hub.
6968
- **Time Grain**. Refers to the frequency at which you want to see the aggregation. In the current command, you see a selected aggregated unit per 5 mins. You can select – 5M/15M/30M/1H/6H/12H and 1D.
7069
- **Start Time and End Time**. This time is based on UTC. Ensure that you're entering UTC values when inputting these parameters. If these parameters aren't used, the past one hour's worth of data is shown by default.
71-
- **Sum Aggregation Type**. The **sum** aggregation type shows you the total number of bytes that traversed the virtual hub router during a selected time period. For example, if you set the Time granularity to 5 minutes, each data point corresponds to the number of bytes sent in that five minute interval. To convert this value to Gbps, you can divide this number by 37500000000. Based on the virtual hub's [capacity](hub-settings.md#capacity), the hub router can support between 3 Gbps and 50 Gbps. The **Max** and **Min** aggregation types aren't meaningful at this time.
70+
- **Sum Aggregation Type**. The **sum** aggregation type shows you the total number of bytes that traversed the virtual hub router during a selected time period. For example, if you set the Time granularity to 5 minutes, each data point corresponds to the number of bytes sent in that five-minute interval. To convert this value to Gbps, you can divide this number by 37500000000. Based on the virtual hub's [capacity](hub-settings.md#capacity), the hub router can support between 3 Gbps and 50 Gbps. The **Max** and **Min** aggregation types aren't meaningful at this time.
7271

7372
[!INCLUDE [horz-monitor-resource-logs](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-resource-logs.md)]
7473

7574
For the available resource log categories, their associated Log Analytics tables, and the log schemas for Virtual WAN, see [Azure Virtual WAN monitoring data reference](monitor-virtual-wan-reference.md#resource-logs).
7675

76+
### <a name="schemas"></a>Schemas
77+
78+
For detailed description of the top-level diagnostic logs schema, see [Supported services, schemas, and categories for Azure Diagnostic Logs](../azure-monitor/essentials/resource-logs-schema.md).
79+
80+
When you review any metrics through Log Analytics, the output contains the following columns:
81+
82+
|**Column**|**Type**|**Description**|
83+
| --- | --- | --- |
84+
|TimeGrain|string|PT1M (metric values are pushed every minute)|
85+
|Count|real|Usually equal to 2 (each MSEE pushes a single metric value every minute)|
86+
|Minimum|real|The minimum of the two metric values pushed by the two MSEEs|
87+
|Maximum|real|The maximum of the two metric values pushed by the two MSEEs|
88+
|Average|real|Equal to (Minimum + Maximum)/2|
89+
|Total|real|Sum of the two metric values from both MSEEs (the main value to focus on for the metric queried)|
90+
91+
92+
7793
### Log Analytics sample query
7894

7995
If you selected to send diagnostic data to a Log Analytics Workspace, then you can use SQL-like queries, such as the following example, to examine the data. For more information, see [Log Analytics Query Language](/services-hub/health/log-analytics-query-language).
@@ -96,6 +112,41 @@ In order to execute the query, you have to open the Log Analytics resource you c
96112

97113
For Azure Firewall, a [workbook](../firewall/firewall-workbook.md) is provided to make log analysis easier. Using its graphical interface, you can investigate the diagnostic data without manually writing any Log Analytics query.
98114

115+
### <a name="create-diagnostic"></a>Create diagnostic setting to view logs
116+
117+
The following steps help you create, edit, and view diagnostic settings:
118+
119+
1. In the portal, navigate to your Virtual WAN resource, then select **Hubs** in the **Connectivity** group.
120+
121+
:::image type="content" source="./media/monitor-virtual-wan-reference/select-hub.png" alt-text="Screenshot that shows the Hub selection in the vWAN Portal." lightbox="./media/monitor-virtual-wan-reference/select-hub.png":::
122+
123+
1. Under the **Connectivity** group on the left, select the gateway for which you want to examine diagnostics:
124+
125+
:::image type="content" source="./media/monitor-virtual-wan-reference/select-hub-gateway.png" alt-text="Screenshot that shows the Connectivity section for the hub." lightbox="./media/monitor-virtual-wan-reference/select-hub-gateway.png":::
126+
127+
1. On the right part of the page, select **Monitor Gateway** and then **Logs**.
128+
129+
:::image type="content" source="./media/monitor-virtual-wan-reference/view-hub-gateway-logs.png" alt-text="Screenshot for Select View in Azure Monitor for Logs." lightbox="./media/monitor-virtual-wan-reference/view-hub-gateway-logs.png":::
130+
131+
1. In this page, you can create a new diagnostic setting (**+Add diagnostic setting**) or edit an existing one (**Edit setting**). You can choose to send the diagnostic logs to Log Analytics (as shown in the following example), stream to an event hub, send to a 3rd-party solution, or archive to a storage account.
132+
133+
:::image type="content" source="./media/monitor-virtual-wan-reference/select-gateway-settings.png" alt-text="Screenshot for Select Diagnostic Log settings." lightbox="./media/monitor-virtual-wan-reference/select-gateway-settings.png":::
134+
1. After clicking **Save**, you should start seeing logs appear in this log analytics workspace within a few hours.
135+
1. To monitor a **secured hub (with Azure Firewall)**, then diagnostics and logging configuration must be done from accessing the **Diagnostic Setting** tab:
136+
137+
:::image type="content" source="./media/monitor-virtual-wan-reference/firewall-diagnostic-settings.png" alt-text="Screenshot shows Firewall diagnostic settings." lightbox="./media/monitor-virtual-wan-reference/firewall-diagnostic-settings.png" :::
138+
139+
> [!IMPORTANT]
140+
> Enabling these settings requires additional Azure services (storage account, event hub, or Log Analytics), which may increase your cost. To calculate an estimated cost, visit the [Azure pricing calculator](https://azure.microsoft.com/pricing/calculator).
141+
142+
## <a name="azure-firewall"></a>Monitoring secured hub (Azure Firewall)
143+
144+
If you chose to secure your virtual hub using Azure Firewall, relevant logs and metrics are available here: [Azure Firewall logs and metrics](../firewall/logs-and-metrics.md).
145+
You can monitor the Secured Hub using Azure Firewall logs and metrics. You can also use activity logs to audit operations on Azure Firewall resources.
146+
For every Azure Virtual WAN you secure and convert to a Secured Hub, Azure Firewall creates an explicit firewall resource object. The object is in the resource group where the hub is located.
147+
148+
:::image type="content" source="./media/monitor-virtual-wan-reference/firewall-resources-portal.png" alt-text="Screenshot shows a Firewall resource in the vWAN hub resource group." lightbox="./media/monitor-virtual-wan-reference/firewall-resources-portal.png":::
149+
99150
[!INCLUDE [horz-monitor-activity-log](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-activity-log.md)]
100151

101152
[!INCLUDE [horz-monitor-analyze-data](~/reusable-content/ce-skilling/azure/includes/azure-monitor/horizontals/horz-monitor-analyze-data.md)]

0 commit comments

Comments
 (0)