Skip to content

Commit 1cb6357

Browse files
authored
Merge pull request #304330 from sujamiya/feature/monitoring-ref-update
Update Azure Firewall monitoring data reference (Observed Capacity)
2 parents 08621de + 16340af commit 1cb6357

2 files changed

Lines changed: 12 additions & 6 deletions

File tree

84.1 KB
Loading

articles/firewall/monitor-firewall-reference.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,18 @@ The following table lists the metrics available for the Microsoft.Network/azureF
2525

2626
[!INCLUDE [Microsoft.Network/azureFirewalls](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/metrics/microsoft-network-azurefirewalls-metrics-include.md)]
2727

28+
29+
### Observed capacity
30+
The Observed Capacity metric is the primary tool for understanding how your firewall is scaling in practice.
31+
32+
Best practices for using it:
33+
- Validate your prescaling setup: Confirm that your firewall consistently maintains the minCapacity you’ve defined.
34+
- Track real-time scaling behavior: Use the Max aggregation to see the highest capacity units reached during peak events.
35+
- Forecast future needs: Combine historical Observed Capacity with traffic trends (e.g., monthly spikes, seasonal events) to refine your capacity planning.
36+
- Set proactive alerts: Configure Azure Monitor alerts on Observed Capacity thresholds (e.g., “alert me if scaling > 80% of maxCapacity”).
37+
- Correlate with performance metrics: Pair Observed Capacity with Throughput, Latency Probe, and SNAT Port Utilization to diagnose whether scaling is keeping up with demand.
38+
39+
2840
### Firewall health state
2941

3042
In the preceding table, the *Firewall health state* metric has two dimensions:
@@ -99,12 +111,6 @@ The latency probe currently uses Microsoft's Ping Mesh technology, which is base
99111

100112
[!INCLUDE [Microsoft.Network/azureFirewalls](~/reusable-content/ce-skilling/azure/includes/azure-monitor/reference/logs/microsoft-network-azurefirewalls-logs-include.md)]
101113

102-
Azure Firewall has two specialized diagnostic logs that can help monitor your firewall, but these logs currently do not show application rule details.
103-
- Top flows
104-
- Flow trace
105-
106-
107-
108114
## Top flows
109115

110116
The top flows log is known in the industry as *fat flow log* and in the preceding table as *Azure Firewall Fat Flow Log*. The top flows log shows the top connections that are contributing to the highest throughput through the firewall.

0 commit comments

Comments
 (0)