Monitoring Azure Virtual WAN

This article provides an overview of the monitoring capabilities for Azure Virtual WAN, helping you gain insights into the health, performance, and security of your virtual network connectivity.

Tip: Effective monitoring is crucial for maintaining a stable and secure virtual network environment. Leverage Azure Monitor and its integrated services to proactively identify and resolve issues.

Key Monitoring Tools and Services

Azure Virtual WAN integrates seamlessly with several Azure services to provide comprehensive monitoring:

Monitoring Virtual WAN Components

You can monitor the following key components of Azure Virtual WAN:

Virtual Hubs

Virtual hubs are the central points of connectivity in Virtual WAN. Monitoring their health and performance is vital. You can view metrics such as:

Connections (VPN & ExpressRoute)

Monitor the status and performance of your VPN and ExpressRoute connections to ensure reliable connectivity to your on-premises networks or other cloud environments.

Firewall (Azure Firewall integrated with Virtual WAN)

If you're using Azure Firewall within your Virtual WAN hub, you can monitor its activity, rules, and threat intelligence.

Routing

Understanding your routing tables is essential for troubleshooting connectivity issues. While not directly a monitoring metric, tools like Network Watcher can help diagnose routing problems.

Using Azure Monitor for Virtual WAN

Azure Monitor provides a centralized experience for monitoring Azure Virtual WAN. You can:

View Metrics

Navigate to your Virtual WAN resource or specific Virtual Hub in the Azure portal. Under the 'Monitoring' section, you can view various performance metrics over different time ranges. You can also pin these metrics to your Azure dashboard for quick access.

Azure Virtual WAN Metrics Example

Figure 1: Example of Virtual WAN metrics in Azure Monitor.

Configure Diagnostic Settings

To collect detailed logs for analysis, configure diagnostic settings for your Virtual WAN resources. You can send logs to:

# Example: Sending logs to Log Analytics (Conceptual) # In Azure Portal: Navigate to Virtual WAN -> Diagnostic settings -> Add diagnostic setting # Select desired logs (e.g., AzureFirewallNetworkLog, AzureFirewallApplicationLog, VpnConnectionDiagnosticLog) # Destination: Log Analytics Workspace # Subscription: Your Subscription # Log Analytics Workspace: YourWorkspaceName

Set Up Alerts

Create alert rules in Azure Monitor to be notified when specific conditions are met. This is crucial for proactive issue resolution. Examples include:

Important: Configure alerts for critical metrics to ensure timely notification of potential network disruptions.

Using Azure Network Watcher

Network Watcher provides advanced network diagnostic and monitoring tools:

Analyzing Logs with Log Analytics

Once logs are sent to a Log Analytics workspace, you can use Kusto Query Language (KQL) to perform powerful analysis.

Example KQL Query: VPN Connection Events

AzureDiagnostics | where ResourceProvider == "MICROSOFT.NETWORK" and Category == "VpnConnectionDiagnosticLog" | where ActivityLog_ cóntains "ConnectionEstablished" | project TimeGenerated, ResourceId, CallerSourceIpAddress, CallerTargetIpAddress, ActivityStatus, ActivityDetails | order by TimeGenerated desc

Example KQL Query: Firewall Network Logs

AzureDiagnostics | where ResourceProvider == "MICROSOFT.NETWORK" and Category == "AzureFirewallNetworkLog" | where RuleCollectionName == "DenyRuleCollection" // Example: Analyzing denied traffic | project TimeGenerated, RuleCollectionName, RuleCollectionGroupName, Priority, SourceIP, DestinationIP, DestinationPort, Protocol | order by TimeGenerated desc
Note: Ensure that the correct diagnostic settings are enabled for your Virtual WAN and Azure Firewall resources to capture the necessary logs for analysis.

Best Practices for Virtual WAN Monitoring

By implementing a robust monitoring strategy, you can ensure the reliability, security, and performance of your Azure Virtual WAN deployment.