You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article provides answers to some of the frequently asked questions asked about Azure Network Watcher.
15
15
@@ -40,10 +40,8 @@ sections:
40
40
* [NSG flow logs](./network-watcher-nsg-flow-logging-overview.md) allows you to log network traffic passing through your [network security groups (NSGs)](../virtual-network/network-security-groups-overview.md).
41
41
* [Traffic analytics](./traffic-analytics.md) processes your NSG flow log data enabling you to visualize, query, analyze, and understand your network traffic.
42
42
43
-
44
43
For more detailed information, see [Network Watcher overview](./network-watcher-monitoring-overview.md).
45
44
46
-
47
45
- question: |
48
46
How does Network Watcher pricing work?
49
47
answer: |
@@ -67,38 +65,47 @@ sections:
67
65
- question: |
68
66
What is the Network Watcher deployment model?
69
67
answer: |
70
-
The Network Watcher parent resource is deployed with a unique instance in every region. Naming format: NetworkWatcher_RegionName. Example: NetworkWatcher_centralus is the Network Watcher resource for the "Central US" region.
71
-
68
+
The Network Watcher parent resource is deployed with a unique instance in every region. Default naming format: NetworkWatcher_RegionName. Example: NetworkWatcher_centralus is the Network Watcher resource for the "Central US" region. You can customize the name of Network Watcher instance using [PowerShell](network-watcher-create.md?tabs=powershell#enable-network-watcher-for-your-region) or [REST API](/rest/api/network-watcher/network-watchers/create-or-update).
69
+
72
70
- question: |
73
-
What is the NetworkWatcherRG?
71
+
Why does Azure allow only one instance of Network Watcher per region?
74
72
answer: |
75
-
NetworkWatcherRG is a resource group that's automatically created for Network Watcher resources. For example, Network Watcher regional instances and the NSG flow log resources are created in **NetworkWatcherRG** resource group.
73
+
Network Watcher just needs to be enabled once per a region per a subscription for its features to work. Network Watcher is enabled in a region by creating a Network Watcher instance in that region.
76
74
77
75
- question: |
78
-
Why do I need to install the Network Watcher agent?
76
+
How can I manage Network Watcher resource?
79
77
answer: |
80
-
The Network Watcher agent is required for any feature that needs to generate or intercept traffic from a virtual machine.
78
+
The Network Watcher resource represents the backend service for Network Watcher, which is fully managed by Azure. You don't need to manage it. Operations like move aren't supported on the resource. However, Network Watcher instance can be [deleted](network-watcher-create.md#disable-network-watcher-for-your-region) to disable Network Watcher in a particular region.
81
79
82
80
- question: |
83
-
Which features require the Network Watcher agent?
81
+
What is the NetworkWatcherRG?
84
82
answer: |
85
-
The Packet capture, Connection troubleshoot and Connection monitor features require the Network Watcher extension to be present.
83
+
NetworkWatcherRG is a resource group that's automatically created for Network Watcher resources. For example, Network Watcher regional instances and the NSG flow log resources are created in **NetworkWatcherRG** resource group. You can customize the name of Network Watcher resource group using [PowerShell](network-watcher-create.md?tabs=powershell#enable-network-watcher-for-your-region), [Azure CLI](network-watcher-create.md?tabs=cli#enable-network-watcher-for-your-region), or [REST API](/rest/api/network-watcher/network-watchers/create-or-update).
86
84
87
85
- question: |
88
-
What are resource limits on Network Watcher?
86
+
What are the resource limits on Network Watcher?
89
87
answer: |
90
-
See the [Service limits](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-network-watcher-limits) page for all limits.
Why does Azure allow only one instance of Network Watcher per region?
94
+
Why do I need to install the Network Watcher agent?
94
95
answer: |
95
-
Network Watcher just needs to be enabled once per a region per a subscription for its features to work. A Network Watcher is enabled in a region by creating an instance in that region.
96
+
The Network Watcher agent is required for any feature that generates or intercepts traffic from a virtual machine.
96
97
97
98
- question: |
98
-
How can I manage Network Watcher resource?
99
+
Which features require the Network Watcher agent?
99
100
answer: |
100
-
The Network Watcher resource represents the backend service for Network Watcher, which is fully managed by Azure. You don't need to manage it. Operations like move aren't supported on the resource. However, [Network Watcher resource can be deleted](./network-watcher-create.md#disable-network-watcher-for-your-region) to disable Network Watcher in a particular region.
101
-
101
+
The Packet capture, Connection troubleshoot and Connection monitor features require the Network Watcher extension to be present.
102
+
103
+
- question: |
104
+
What ports does the Network Watcher agent use?
105
+
answer: |
106
+
- **Linux**: the Network Watcher agent uses available ports starting from port 50000 and above until it reaches port 65535.
107
+
- **Windows**: the Network Watcher agent uses ports that Windows responds with when queried for available ports.
108
+
102
109
- name: Service availability and redundancy
103
110
questions:
104
111
- question: |
@@ -111,13 +118,45 @@ sections:
111
118
answer: |
112
119
No configuration is necessary to enable zone-resiliency. Zone-resiliency for Network Watcher resources is available by default and managed by the service itself.
113
120
121
+
- name: Connection monitor
122
+
questions:
123
+
- question: |
124
+
Does connection monitor support classic VMs?
125
+
answer: |
126
+
No, connection monitor doesn't support classic VMs. We recommended that you migrate infrastructure as a service (IaaS) resources from classic to Azure Resource Manager because classic resources [will be deprecated](../virtual-machines/classic-vm-deprecation.md). For more information, see [Migrate IaaS resources from classic to Azure Resource Manager](../virtual-machines/migration-classic-resource-manager-overview.md).
127
+
128
+
- question: |
129
+
What if my topology isn't decorated or my hops have missing information?
130
+
answer: |
131
+
Topology can be decorated from non-Azure to Azure only if the destination Azure resource and the connection monitor resource are in the same region.
132
+
133
+
- question: |
134
+
What happens if the connection monitor creation fails with the following error: "We don't allow creating different endpoints for the same VM"?
135
+
answer: |
136
+
The same Azure VM can't be used with different configurations in the same connection monitor. For example, using same VM with a filter and without a filter in the same connection monitor isn't supported.
137
+
138
+
- question: |
139
+
What happens if the test failure reason is "Nothing to display"?
140
+
answer: |
141
+
Issues that are displayed on the connection monitor dashboard are found during topology discovery or hop exploration. There can be cases where the threshold set for % loss or RTT is reached but no issues are found on hops.
142
+
143
+
- question: |
144
+
When migrating an existing connection monitor (classic) to the latest connection monitor, what happens if the external endpoint tests are migrated with the TCP protocol only?
145
+
answer: |
146
+
There's no protocol selection option in connection monitor (classic). Tests in connection monitor (classic) only use the TCP protocol, and that's why, during the migration, we create a TCP configuration in tests in the new connection monitor.
147
+
114
148
- name: NSG flow logs
115
149
questions:
116
150
- question: |
117
151
What does NSG flow logs do?
118
152
answer: |
119
-
NSG flow logs enable you to log 5-tuple flow information about network traffic that passes through your [network security groups](../virtual-network/network-security-groups-overview.md). The raw flow logs are written to an Azure storage account from where they can be further processed, analyzed, queried, or exported as needed.
120
-
153
+
NSG flow logs enable you to log 5-tuple flow information about network traffic that passes through your [network security groups](../virtual-network/network-security-groups-overview.md). The raw flow logs are written to an Azure storage account. From there, you can further process, analyze, query, or export them as needed.
154
+
155
+
- question: |
156
+
Do flow logs affect network latency or performance?
157
+
answer: |
158
+
Flow log data is collected outside the path of your network traffic, so it doesn't affect network throughput or latency. You can create or delete flow logs without any risk of impact to network performance.
159
+
121
160
- question: |
122
161
How do I use NSG flow logs with a storage account behind a firewall?
123
162
answer: |
@@ -126,7 +165,7 @@ sections:
126
165
1. Go to the storage account by entering the storage account's name in the search box at the top of the portal.
127
166
2. Under the **Security + networking**, select **Networking**, then select **Firewalls and virtual networks**.
128
167
3. In **Public network access**, select **Enabled from selected virtual networks and IP addresses**. Then under **Exceptions**, check the box next to **Allow Azure services on the trusted services list to access this storage account.**
129
-
4. Enable NSG flow logs by creating a flow log for your target network security group using the above storage account. For more information, see [Create a flow log](nsg-flow-logging.md#create-a-flow-log).
168
+
4. Enable NSG flow logs by creating a flow log for your target network security group using the storage account. For more information, see [Create a flow log](nsg-flow-logging.md#create-a-flow-log).
130
169
131
170
You can check the storage logs after a few minutes. You should see an updated TimeStamp or a new JSON file created.
132
171
@@ -136,9 +175,9 @@ sections:
136
175
NSG flow logs are compatible with Service Endpoints without requiring any extra configuration. For more information, see [Enable a service endpoint](../virtual-network/tutorial-restrict-network-access-to-resources.md#enable-a-service-endpoint).
137
176
138
177
- question: |
139
-
What is the difference between flow logs versions 1 & 2?
178
+
What is the difference between flow logs versions 1 and 2?
140
179
answer: |
141
-
Flow logs version 2 introduces the concept of *Flow State* and stores information about bytes and packets transmitted. For more information, see [NSG flow log format](./network-watcher-nsg-flow-logging-overview.md#log-format).
180
+
Flow logs version 2 introduces the concept of *flow state* and stores information about bytes and packets transmitted. For more information, see [NSG flow log format](./network-watcher-nsg-flow-logging-overview.md#log-format).
0 commit comments