Skip to content

Commit f24f45f

Browse files
Acrolinx and minor edits.
1 parent 6befba8 commit f24f45f

File tree

2 files changed

+18
-22
lines changed

2 files changed

+18
-22
lines changed

articles/firewall/monitor-firewall-reference.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -31,11 +31,11 @@ In the preceding table, the *Firewall health state* metric has two dimensions:
3131
- Status: Possible values are *Healthy*, *Degraded*, *Unhealthy*.
3232
- Reason: Indicates the reason for the corresponding status of the firewall.
3333

34-
If SNAT ports are used > 95%, they're considered exhausted and the health is 50% with status=*Degraded* and reason=*SNAT port*. The firewall keeps processing traffic and existing connections aren't affected. However, new connections might not be established intermittently.
34+
If SNAT ports are used more than 95%, they're considered exhausted and the health is 50% with status=*Degraded* and reason=*SNAT port*. The firewall keeps processing traffic and existing connections aren't affected. However, new connections might not be established intermittently.
3535

36-
If SNAT ports are used < 95%, then firewall is considered healthy and health is shown as 100%.
36+
If SNAT ports are used less than 95%, then firewall is considered healthy and health is shown as 100%.
3737

38-
If no SNAT ports usage is reported, health is shown as 0%.
38+
If no SNAT ports usage is reported, health is shown as 0%.
3939

4040
#### SNAT port utilization
4141

@@ -84,7 +84,7 @@ Azure Firewall has two new diagnostics logs you can use to help monitor your fir
8484

8585
## Top flows
8686

87-
The top flows log, known in the industry and in the preceding table as *Azure Firewall Fat Flow Log*, shows the top connections that are contributing to the highest throughput through the firewall.
87+
The top flows log is known in the industry as *fat flow log* and in the preceding table as *Azure Firewall Fat Flow Log*. The top flows log shows the top connections that are contributing to the highest throughput through the firewall.
8888

8989
> [!TIP]
9090
> Activate Top flows logs only when troubleshooting a specific issue to avoid excessive CPU usage of Azure Firewall.
@@ -94,7 +94,7 @@ The flow rate is defined as the data transmission rate in megabits per second un
9494

9595
Enable the Top flows log using the following Azure PowerShell commands:
9696

97-
```azurepowershell
97+
```powershell
9898
Set-AzContext -SubscriptionName <SubscriptionName>
9999
$firewall = Get-AzFirewall -ResourceGroupName <ResourceGroupName> -Name <FirewallName>
100100
$firewall.EnableFatFlowLogging = $true
@@ -105,7 +105,7 @@ To disable the logs, use the same previous Azure PowerShell command and set the
105105

106106
For example:
107107

108-
```azurepowershell
108+
```powershell
109109
Set-AzContext -SubscriptionName <SubscriptionName>
110110
$firewall = Get-AzFirewall -ResourceGroupName <ResourceGroupName> -Name <FirewallName>
111111
$firewall.EnableFatFlowLogging = $false
@@ -118,21 +118,17 @@ There are a few ways to verify the update was successful, but you can navigate t
118118

119119
To create a diagnostic setting and enable Resource Specific Table, see [Create diagnostic settings in Azure Monitor](../azure-monitor/essentials/create-diagnostic-settings.md).
120120

121-
The firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, this doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred. The Azure Firewall Flow Trace Log addresses this concern.
121+
The firewall logs show traffic through the firewall in the first attempt of a TCP connection, known as the *SYN* packet. However, such an entry doesn't show the full journey of the packet in the TCP handshake. As a result, it's difficult to troubleshoot if a packet is dropped, or asymmetric routing occurred. The Azure Firewall Flow Trace Log addresses this concern.
122122

123123
> [!TIP]
124124
> To avoid excessive disk usage caused by Flow trace logs in Azure Firewall with many short-lived connections, activate the logs only when troubleshooting a specific issue for diagnostic purposes.
125125
126-
The following additional properties can be added:
126+
The following properties can be added:
127127

128128
- SYN-ACK: ACK flag that indicates acknowledgment of SYN packet.
129-
130129
- FIN: Finished flag of the original packet flow. No more data is transmitted in the TCP flow.
131-
132130
- FIN-ACK: ACK flag that indicates acknowledgment of FIN packet.
133-
134131
- RST: The Reset the flag indicates the original sender doesn't receive more data.
135-
136132
- INVALID (flows): Indicates packet can’t be identified or don't have any state.
137133

138134
For example:
@@ -151,7 +147,7 @@ Register-AzProviderFeature -FeatureName AFWEnableTcpConnectionLogging -ProviderN
151147
Register-AzResourceProvider -ProviderNamespace Microsoft.Network
152148
```
153149

154-
It can take several minutes for this to take effect. Once the feature is registered, consider performing an update on Azure Firewall for the change to take effect immediately.
150+
It can take several minutes for this change to take effect. Once the feature is registered, consider performing an update on Azure Firewall for the change to take effect immediately.
155151

156152
To check the status of the AzResourceProvider registration, you can run the Azure PowerShell command:
157153

articles/firewall/monitor-firewall.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -72,11 +72,11 @@ With structured logs, you're able to choose to use [Resource Specific Tables](..
7272

7373
In **Resource specific** mode, individual tables in the selected workspace are created for each category selected in the diagnostic setting. This method is recommended since it:
7474

75-
- Might reduce overall logging costs by up to 80%.
76-
- makes it much easier to work with the data in log queries
77-
- makes it easier to discover schemas and their structure
78-
- improves performance across both ingestion latency and query times
79-
- allows you to grant Azure RBAC rights on a specific table
75+
- might reduce overall logging costs by up to 80%.
76+
- makes it much easier to work with the data in log queries.
77+
- makes it easier to discover schemas and their structure.
78+
- improves performance across both ingestion latency and query times.
79+
- allows you to grant Azure RBAC rights on a specific table.
8080

8181
New resource specific tables are now available in Diagnostic setting that allows you to utilize the following categories:
8282

@@ -130,7 +130,7 @@ To learn how to enable the diagnostic logging using the Azure portal, see [Enabl
130130

131131
### Application rule log
132132

133-
The Application rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you've enabled it for each Azure Firewall. Each new connection that matches one of your configured application rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following examples:
133+
The Application rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that matches one of your configured application rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following examples:
134134

135135
```console
136136
Category: application rule logs.
@@ -165,7 +165,7 @@ The Application rule log is saved to a storage account, streamed to Event hubs a
165165

166166
### Network rule log
167167

168-
The Network rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you've enabled it for each Azure Firewall. Each new connection that matches one of your configured network rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following example:
168+
The Network rule log is saved to a storage account, streamed to Event hubs and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. Each new connection that matches one of your configured network rules results in a log for the accepted/denied connection. The data is logged in JSON format, as shown in the following example:
169169

170170
```console
171171
Category: network rule logs.
@@ -189,7 +189,7 @@ The Network rule log is saved to a storage account, streamed to Event hubs and/o
189189

190190
### DNS proxy log
191191

192-
The DNS proxy log is saved to a storage account, streamed to Event hubs, and/or sent to Azure Monitor logs only if you’ve enabled it for each Azure Firewall. This log tracks DNS messages to a DNS server configured using DNS proxy. The data is logged in JSON format, as shown in the following examples:
192+
The DNS proxy log is saved to a storage account, streamed to Event hubs, and/or sent to Azure Monitor logs only if you enable it for each Azure Firewall. This log tracks DNS messages to a DNS server configured using DNS proxy. The data is logged in JSON format, as shown in the following examples:
193193

194194
```console
195195
Category: DNS proxy logs.
@@ -226,7 +226,7 @@ The DNS proxy log is saved to a storage account, streamed to Event hubs, and/or
226226
}
227227
```
228228

229-
msg format:
229+
Message format:
230230

231231
```console
232232
[client’s IP address]:[client’s port] – [query ID] [type of the request] [class of the request] [name of the request] [protocol used] [request size in bytes] [EDNS0 DO (DNSSEC OK) bit set in the query] [EDNS0 buffer size advertised in the query] [response CODE] [response flags] [response size] [response duration]

0 commit comments

Comments
 (0)