-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Implementing Microsoft Azure Architect Technologies: AZ-303 Exam Prep and Beyond
By :

Azure provides the Network Watcher tool for monitoring and investigating problems between devices on a Virtual Network (VNET), including the following:
Important note
A VNET is a private network you can create in your Azure subscription. VNETs are defined with set IP ranges, which in turn can be sub-divided into subnets. Some Azure services, such as VMs, must be connected to a VNET. Other services, such as App Services and Azure SQL, can optionally use VNETs to ensure traffic between them is direct and secure.
You can also see a topology map of devices to understand better the various components involved in the communication flow.
The first step in setting up the Network Watcher capabilities is to ensure it has been enabled for the region(s) you are using by following these steps:
Network Monitor
:Figure 1.15 – Enabling Network Watcher per Region
Figure 1.16 – Network Monitor Topology view
Once Network Watcher has been enabled for your region, we can now start to use the different tools, such as Connection Monitor, to troubleshoot and fix common communication problems.
When services are running, you may want to be alerted to issues with connectivity. An example might be a web server that needs to maintain a connection to a backend database server. However, the destination can be another VM, a URI, or an IP address. The URI or IP address can be either an internal resource in your Azure subscription or an external resource.
Connection Monitor allows us to set up continual monitors that can trigger alerts when communications are interrupted:
a) Name: InternetConnection
b) Virtual Machine: Source VM you wish to monitor
c) Destination:
--Specify Manually
--URI: www.packtpub.com
d) Port: 443
Figure 1.17 – Connection Monitor setup example
Once set up, you can select the Connection Monitor you have just created, and it will show basic details of the status and flow of traffic from source to destination. You can also set the time period to see data from the past hour up to the past 30 days as shown in the following screenshot:
Figure 1.18 – Connection Monitor example
Connection Monitor is great for initial investigations and for setting up alerts; for more complex issues we use advanced options such as the Diagnostics tooling.
When you encounter connectivity issues, Network Watcher diagnostics offers a range of tools to help pinpoint the problem.
The first step in troubleshooting connectivity issues is to confirm that traffic is flowing.
IP Flow Verify allows you to confirm the flow of traffic from a source to a destination is working. Set up a typical test by performing the following steps:
The following figure shows an example request. When the Check button is clicked, we can see a status response returned. In the example, we can see the request has failed, but importantly we see it failed because of the DenyAllOutbound Network Security Group rule:
Figure 1.19 – IP flow verify example
IP flow verify helps to confirm that end-to-end communication is functioning, but if you do find problems you can use other Network Watcher tools to continue your investigations.
The subsequent step in identifying communications issues could be to understand the route traffic takes from point a to point b, and the Next Hop service helps with this:
The example in the following screenshot shows the next hop to the IP address (one of the Bing.com
addresses) is the Azure Internet egress appliance, and the route to it has been defined in the system route table (route tables will be covered in Chapter 4, Implementing and Managing Virtual Networking):
Figure 1.20 – Next Hop configuration example
Depending on the results from the IP flow verify and Next Hop tools, the next step in your troubleshooting process may be to look at access issues.
A common cause of issues is a misconfiguration of Network Security Groups (NSG) between devices. We cover NSGs in Chapter 10, Implementing Load Balancing and Network Security. In brief, they allow you to define firewall rules on VNETs or devices.
Restrictions on allowed IP addresses and ports can be set in multiple layers, and as such, can become complex and challenging to manage. For this reason, you can use the effective security rules option:
Figure 1.21 – Configuring the effective security rules option
Figure 1.22 – Example of effective NSG rules in action
We will now have a look at using Packet Capture to examine the data.
When everything looks OK but you are still experiencing issues, you may need to look in detail at the actual traffic being sent and received. Specialist tools are available for analyzing packet information, and through the Network Watcher, you can set up Packet Capture to collect data for a specific amount of time and then examine that traffic:
The following screenshot shows an example of what this looks like:
Figure 1.23 – Example packet capture setup
Figure 1.24 – Packet capture filters
The following screenshot shows an example of how this might look:
Figure 1.25 – Example Packet Capture
The Packet Capture can then be opened in a viewing tool for a detailed examination of the traffic. The following screenshot shows an example of how this might look:
Figure 1.26 – Example traffic details from a Packet Capture
As we have seen, Network Watcher is a robust set of tools to help identify issues with connectivity and to provide a detailed analysis of the flow of traffic. Also, it is important for monitoring traffic and events for security purposes.