Skip to content

Commit ea9f9e0

Browse files
authored
Merge pull request #288560 from halkazwini/nw-grafana-sfi
Updates: Manage and analyze network security group flow logs using Network Watcher and Grafana
2 parents cb39a50 + d8506f6 commit ea9f9e0

File tree

2 files changed

+1
-5
lines changed

2 files changed

+1
-5
lines changed

articles/network-watcher/network-watcher-nsg-grafana.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: how-to
9-
ms.date: 09/26/2024
9+
ms.date: 10/16/2024
1010
ms.custom: linux-related-content
1111
---
1212

@@ -189,10 +189,6 @@ Now that you have successfully configured Grafana to read from the ElasticSearch
189189
190190
![Dashboard graph](./media/network-watcher-nsg-grafana/network-watcher-nsg-grafana-fig3.png)
191191
192-
The following screenshot depicts a graph and chart showing the top flows and their frequency. Flows are also shown by NSG rule and flows by decision. Grafana is highly customizable so it's advisable that you create dashboards to suit your specific monitoring needs. The following example shows a typical dashboard:
193-
194-
![Screenshot that shows the sample graph configuration with flows segmented by NSG rule.](./media/network-watcher-nsg-grafana/network-watcher-nsg-grafana-fig4.png)
195-
196192
## Conclusion
197193
198194
By integrating Network Watcher with ElasticSearch and Grafana, you now have a convenient and centralized way to manage and visualize NSG flow logs as well as other data. Grafana has a number of other powerful graphing features that can also be used to further manage flow logs and better understand your network traffic. Now that you have a Grafana instance set up and connected to Azure, feel free to continue to explore the other functionality that it offers.

0 commit comments

Comments
 (0)