You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/monitor-firewall-reference.md
+9-13Lines changed: 9 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,11 +31,11 @@ In the preceding table, the *Firewall health state* metric has two dimensions:
31
31
- Status: Possible values are *Healthy*, *Degraded*, *Unhealthy*.
32
32
- Reason: Indicates the reason for the corresponding status of the firewall.
33
33
34
-
If SNAT ports are used > 95%, they're considered exhausted and the health is 50% with status=*Degraded* and reason=*SNAT port*. The firewall keeps processing traffic and existing connections aren't affected. However, new connections might not be established intermittently.
34
+
If SNAT ports are used more than 95%, they're considered exhausted and the health is 50% with status=*Degraded* and reason=*SNAT port*. The firewall keeps processing traffic and existing connections aren't affected. However, new connections might not be established intermittently.
35
35
36
-
If SNAT ports are used < 95%, then firewall is considered healthy and health is shown as 100%.
36
+
If SNAT ports are used less than 95%, then firewall is considered healthy and health is shown as 100%.
37
37
38
-
If no SNAT ports usage is reported, health is shown as 0%.
38
+
If no SNAT ports usage is reported, health is shown as 0%.
39
39
40
40
#### SNAT port utilization
41
41
@@ -84,7 +84,7 @@ Azure Firewall has two new diagnostics logs you can use to help monitor your fir
84
84
85
85
## Top flows
86
86
87
-
The top flows log, known in the industry and in the preceding table as *Azure Firewall Fat Flow Log*, shows the top connections that are contributing to the highest throughput through the firewall.
87
+
The top flows log is known in the industry as *fat flow log*and in the preceding table as *Azure Firewall Fat Flow Log*. The top flows log shows the top connections that are contributing to the highest throughput through the firewall.
88
88
89
89
> [!TIP]
90
90
> Activate Top flows logs only when troubleshooting a specific issue to avoid excessive CPU usage of Azure Firewall.
@@ -94,7 +94,7 @@ The flow rate is defined as the data transmission rate in megabits per second un
94
94
95
95
Enable the Top flows log using the following Azure PowerShell commands:
@@ -118,21 +118,17 @@ There are a few ways to verify the update was successful, but you can navigate t
118
118
119
119
To create a diagnostic setting and enable Resource Specific Table, see [Create diagnostic settings in Azure Monitor](../azure-monitor/essentials/create-diagnostic-settings.md).
120
120
121
-
The firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred. The Azure Firewall Flow Trace Log addresses this concern.
121
+
The firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, such an entry doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred. The Azure Firewall Flow Trace Log addresses this concern.
122
122
123
123
> [!TIP]
124
124
> To avoid excessive disk usage caused by Flow trace logs in Azure Firewall with many short-lived connections, activate the logs only when troubleshooting a specific issue for diagnostic purposes.
125
125
126
-
The following additional properties can be added:
126
+
The following properties can be added:
127
127
128
128
- SYN-ACK: ACK flag that indicates acknowledgment of SYN packet.
129
-
130
129
- FIN: Finished flag of the original packet flow. No more data is transmitted in the TCP flow.
131
-
132
130
- FIN-ACK: ACK flag that indicates acknowledgment of FIN packet.
133
-
134
131
- RST: The Reset the flag indicates the original sender doesn't receive more data.
135
-
136
132
- INVALID (flows): Indicates packet can’t be identified or don't have any state.
It can take several minutes for this to take effect. Once the feature is registered, consider performing an update on Azure Firewall for the change to take effect immediately.
150
+
It can take several minutes for this change to take effect. Once the feature is registered, consider performing an update on Azure Firewall for the change to take effect immediately.
155
151
156
152
To check the status of the AzResourceProvider registration, you can run the Azure PowerShell command:
Copy file name to clipboardExpand all lines: articles/firewall/monitor-firewall.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,11 +72,11 @@ With structured logs, you're able to choose to use [Resource Specific Tables](..
72
72
73
73
In **Resource specific** mode, individual tables in the selected workspace are created for each category selected in the diagnostic setting. This method is recommended since it:
74
74
75
-
-Might reduce overall logging costs by up to 80%.
76
-
- makes it much easier to work with the data in log queries
77
-
- makes it easier to discover schemas and their structure
78
-
- improves performance across both ingestion latency and query times
79
-
- allows you to grant Azure RBAC rights on a specific table
75
+
-might reduce overall logging costs by up to 80%.
76
+
- makes it much easier to work with the data in log queries.
77
+
- makes it easier to discover schemas and their structure.
78
+
- improves performance across both ingestion latency and query times.
79
+
- allows you to grant Azure RBAC rights on a specific table.
80
80
81
81
New resource specific tables are now available in Diagnostic setting that allows you to utilize the following categories:
82
82
@@ -130,7 +130,7 @@ To learn how to enable the diagnostic logging using the Azure portal, see [Enabl
130
130
131
131
### Application rule log
132
132
133
-
The Application rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you've enabled it for each Azure Firewall. Each new connection that matches one of your configured application rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following examples:
133
+
The Application rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that matches one of your configured application rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following examples:
134
134
135
135
```console
136
136
Category: application rule logs.
@@ -165,7 +165,7 @@ The Application rule log is saved to a storage account, streamed to Event hubs a
165
165
166
166
### Network rule log
167
167
168
-
The Network rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you've enabled it for each Azure Firewall. Each new connection that matches one of your configured network rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following example:
168
+
The Network rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that matches one of your configured network rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following example:
169
169
170
170
```console
171
171
Category: network rule logs.
@@ -189,7 +189,7 @@ The Network rule log is saved to a storage account, streamed to Event hubs and/o
189
189
190
190
### DNS proxy log
191
191
192
-
The DNS proxy log is saved to a storage account, streamed to Event hubs, and/or sent to Azure Monitor logs only if you’ve enabled it for each Azure Firewall. This log tracks DNS messages to a DNS server configured using DNS proxy. The data is logged in JSON format, as shown in the following examples:
192
+
The DNS proxy log is saved to a storage account, streamed to Event hubs, and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. This log tracks DNS messages to a DNS server configured using DNS proxy. The data is logged in JSON format, as shown in the following examples:
193
193
194
194
```console
195
195
Category: DNS proxy logs.
@@ -226,7 +226,7 @@ The DNS proxy log is saved to a storage account, streamed to Event hubs, and/or
226
226
}
227
227
```
228
228
229
-
msg format:
229
+
Message format:
230
230
231
231
```console
232
232
[client’s IP address]:[client’s port] – [query ID] [type of the request] [class of the request] [name of the request] [protocol used] [request size in bytes] [EDNS0 DO (DNSSEC OK) bit set in the query] [EDNS0 buffer size advertised in the query] [response CODE] [response flags] [response size] [response duration]
0 commit comments