IT safety directors are sometimes referred to as on to troubleshoot community points. As an illustration, a important software could exhibit latency or disconnections, irritating finish customers. These points could also be attributable to a current routing replace or adjustments in safety. In some circumstances, the trigger could also be as a result of a sudden burst in community site visitors—overwhelming the community sources.
Microsoft Azure Firewall now gives new logging and metric enhancements designed to extend visibility and supply extra insights into site visitors processed by the firewall. IT safety directors could use a mixture of the next to root trigger software efficiency points:
o Latency Probe metric is now in preview.
o Circulate Hint Log is now in preview.
o Fats Flows Log is now in preview.
Azure Firewall is a cloud-native firewall as a service providing that permits prospects to centrally govern and log all their site visitors flows utilizing a DevOps strategy. The service helps each software and network-level filtering guidelines and is built-in with the Microsoft Defender Risk Intelligence feed to filter recognized malicious IP addresses and domains. Azure Firewall is very obtainable with built-in auto-scaling.
Latency Probe metric—now in preview
In a community infrastructure, one could observe will increase in latency relying on varied elements. The power to watch the latency of the firewall is crucial for proactively participating in any potential points with site visitors or providers within the infrastructure.
The Latency Probe metric is designed to measure the general latency of Azure Firewall and supply perception into the well being of the service. IT directors can use the metric for monitoring and alerting if there’s observable latency and diagnosing if the Azure Firewall is the reason for latency in a community.
Within the case that Azure Firewall is experiencing latency, this may be as a result of varied causes, resembling excessive CPU utilization, site visitors throughput, or networking points. As an necessary word, this software is powered by Pingmesh know-how, which signifies that the metric measures the typical latency of the firewall itself. The metric doesn’t measure end-to-end latency or the latency of particular person packets.

Circulate Hint logs—now in preview
Azure Firewall logging offers logs for varied site visitors—resembling community, software, and menace intelligence site visitors. In the present day, these logs present site visitors via the firewall within the first try at a Transmission Management Protocol (TCP) connection, often known as the SYN packet. Nevertheless, this fails to indicate the total journey of the packet within the TCP handshake. The power to watch and observe each packet via the firewall is paramount for figuring out packet drops or uneven routes.
To dive additional into an uneven routing instance, Azure Firewall—as a stateful firewall—maintains state connections and mechanically and dynamically permits site visitors to efficiently come again to the firewall. Nevertheless, uneven routing can happen when a packet takes one path to the vacation spot via the firewall and takes a distinct path when trying to return to the supply. This may be as a result of consumer misconfiguration, resembling including an pointless route within the path of the firewall.
Because of this, one can confirm if a packet has efficiently flowed via the firewall or if there’s uneven routing by viewing the extra TCP handshake logs in Circulate Hint.
To take action, you’ll be able to monitor community logs to view the primary SYN packet and click on “allow Circulate Hint” to see the extra flags for verification:
o SYN-ACK
o FIN
o FIN-ACK
o RST
o INVALID
By including these further flags in Circulate Hint logs, IT directors can now see the return packet, if there was a failed connection, or an unrecognized packet. To allow these logs, please learn the documentation linked under.
High Flows—now in preview
In the present day, Microsoft Azure Firewall Customary can assist as much as 30 Gbps and Azure Firewall Premium can assist as much as 100 Gbps of site visitors processing. Nevertheless, in any case, typically site visitors flows can both be unintentionally or deliberately “heavy” relying on the scale, period, and different elements of the packets. Since these flows can doubtlessly impression different flows and the processing of the firewall, it’s necessary to watch these site visitors flows, to make sure that the firewall can carry out optimally.
The High Flows log—or industry-known as Fats Flows—log exhibits the highest connections which can be contributing to the best bandwidth in a given timeframe via the firewall.
This visibility offers the next advantages for IT directors:
o Figuring out the highest site visitors flows traversing via the firewall.
o Figuring out any surprising or anomaly site visitors.
o Deciding what site visitors needs to be allowed or denied, based mostly on outcomes and objectives.
To allow these logs, please learn the documentation linked under.

Subsequent steps
For extra data on Azure Firewall and all the pieces we coated on this weblog put up, see the next sources:
· Azure Firewall documentation.
· Azure Firewall Supervisor documentation.