Skip to content

Commit 8bd20cf

Browse files
Merge pull request #260218 from vhorne/fw-top-flows
updates for flow trace and top flows
2 parents 42779a9 + f4428fd commit 8bd20cf

2 files changed

Lines changed: 33 additions & 2 deletions

File tree

articles/firewall/enable-top-ten-and-flow-trace.md

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ The Top flows log (known in the industry as Fat Flows), shows the top connection
2525
> Activate Top flows logs only when troubleshooting a specific issue to avoid excessive CPU usage of Azure Firewall.
2626
>
2727
28+
The flow rate is defined as the data transmission rate (in Megabits per second units). In other words, it is a measure of the amount of digital data that can be transmitted over a network in a period of time through the firewall. The Top Flows protocol runs periodically every three minutes. The minimum threshold to be considered a Top Flow is 1 Mbps.
29+
2830
### Prerequisites
2931

3032
- Enable [structured logs](firewall-structured-logs.md#enable-structured-logs)
@@ -40,6 +42,20 @@ $firewall = Get-AzFirewall -ResourceGroupName <ResourceGroupName> -Name <Firewal
4042
$firewall.EnableFatFlowLogging = $true
4143
Set-AzFirewall -AzureFirewall $firewall
4244
```
45+
46+
### Disable the log
47+
48+
To disable the logs, use the same previous Azure PowerShell command and set the value to *False*.
49+
50+
For example:
51+
52+
```azurepowershell
53+
Set-AzContext -SubscriptionName <SubscriptionName>
54+
$firewall = Get-AzFirewall -ResourceGroupName <ResourceGroupName> -Name <FirewallName>
55+
$firewall.EnableFatFlowLogging = $false
56+
Set-AzFirewall -AzureFirewall $firewall
57+
```
58+
4359
### Verify the update
4460

4561
There are a few ways to verify the update was successful, but you can navigate to firewall **Overview** and select **JSON view** on the top right corner. Here’s an example:
@@ -88,7 +104,13 @@ The following additional properties can be added:
88104

89105
- INVALID (flows)
90106

91-
Indicates packet can’t be identified or don't have any state; TCP packet is landing on a Virtual Machine Scale Sets instance, which doesn't have any prior history to this packet.
107+
Indicates packet can’t be identified or don't have any state.
108+
109+
For example:
110+
- A TCP packet lands on a Virtual Machine Scale Sets instance, which doesn't have any prior history for this packet
111+
- Bad CheckSum packets
112+
- Connection Tracking table entry is full and new connections cannot be accepted
113+
- Overly delayed ACK packets
92114

93115
### Prerequisites
94116

@@ -97,7 +119,9 @@ The following additional properties can be added:
97119

98120
### Enable the log
99121

100-
Enable the log using the following Azure PowerShell commands:
122+
Enable the log using the following Azure PowerShell commands or navigate to the Preview features in the portal and search for **Enable TCP Connection Logging**:
123+
124+
:::image type="content" source="media/enable-top-ten-and-flow-trace/preview-features.png" alt-text="Screenshot showing Azure portal preview features.":::
101125

102126
```azurepowershell
103127
Connect-AzAccount
@@ -112,6 +136,13 @@ To check the status of the AzResourceProvider registration, you can run the Azur
112136

113137
`Get-AzProviderFeature -FeatureName "AFWEnableTcpConnectionLogging" -ProviderNamespace "Microsoft.Network"`
114138

139+
### Disable the log
140+
141+
To disable the log, you can unregister it using the following command or select unregister in the previous portal example.
142+
143+
`Get-AzProviderFeature -FeatureName "AFWEnableTcpConnectionLogging" -ProviderNamespace "Microsoft.Network"`
144+
145+
115146
### Create a diagnostic setting and enable Resource Specific Table
116147

117148
1. In the Diagnostic settings tab, select **Add diagnostic setting**.
50.1 KB
Loading

0 commit comments

Comments
 (0)