Monitoring and analyzing network traffic is crucial for maintaining a secure and efficient Azure environment. Azure Firewall provides robust logging capabilities that allow you to scrutinize traffic flows, particularly focusing on Fully Qualified Domain Names (FQDNs). By leveraging Azure Firewall's logs and employing Kusto Query Language (KQL), you can identify the top FQDNs contributing to your network traffic. Understanding Azure Firewall Logs Azure Firewall generates various logs that offer insights into its operations:
Identifying Top FQDN Traffic Flows To pinpoint the top FQDNs in your network traffic, you can utilize the following KQL approach: let ApplicationRuleData = AzureDiagnostics | where Category == "AzureFirewallApplicationRule" | where Fqdn contains "blob." and action_s == "Allow" | summarize count() by SourceIp, Fqdn; let FlowData = AzureDiagnostics | where Category == "AzureFirewallFatFlowLog" | summarize sum(FlowRate / 1024) by SourceIp, DestinationIp | sort by sum_ desc; ApplicationRuleData | join kind=inner (FlowData) on SourceIp | summarize TotalFlowRate = sum(sum_) by Fqdn | order by TotalFlowRate desc Explanation of the Query
Considerations
By effectively analyzing Azure Firewall logs with KQL, you can identify the top FQDNs impacting your network traffic. This insight allows for informed decisions on traffic management, security policy adjustments, and resource allocation, ultimately enhancing the performance and security of your Azure environment.
0 Comments
Leave a Reply. |
Author
Mohammad Al Rousan is a Microsoft MVP (Azure), Microsoft Certified Solution Expert (MCSE) in Cloud Platform & Azure DevOps & Infrastructure, An active community blogger and speaker. Al Rousan has over 11 years of professional experience in IT Infrastructure and very passionate about Microsoft technologies and products. Top 10 Microsoft Azure Blogs
Archives
January 2025
Categories
All
|