Edit

Share via


Event log options for Azure Virtual Network Manager

Azure Virtual Network Manager uses Azure Monitor for data collection and analysis like many other Azure services. Azure Virtual Network Manager provides event logs for each network manager. You can store and view event logs with Azure Monitor’s Log Analytics tool in the Azure portal, and through a storage account. You can also send these logs to an event hub or partner solution.

Supported log categories

Azure Virtual Network Manager currently provides the following log categories:

  • Network group membership change
    • Track when a particular virtual network’s network group membership is modified. In other words, a log is emitted when a virtual network is added to or removed from a network group. This can be used to trace network group membership changes over time and to capture a snapshot of a particular virtual network’s network group membership.
  • Rule collection change
    • Track when a particular virtual network’s set of applied security admin rule collections changes. A log is emitted for every rule collection deployed to a virtual network via the network group the rule collection is targeting. Any removal of a rule collection from a network group through a deployment process will also result in a log for each affected virtual network. This schema can be used to track what rule collections are deployed to a particular virtual network over time.
    • If a virtual network is receiving security admin rule collections from multiple network managers, logs are emitted separately for each network manager for their respective rule collection changes.
    • If a virtual network is added to or removed from a network group that already has a rule collection deployed onto it, a log is emitted for that virtual network showing the state of applied rule collection.
  • Connectivity configuration change
    • Track when a particular virtual network's applied connectivity configuration changes. A log is emitted for every connectivity configuration deployed to a virtual network via the network group the configuration is targeting. Any removal of a connectivity configuration from a network group through a deployment process results in a log for each affected virtual network. This schema can be used to track what connectivity configurations and their respective topology types are deployed to a particular virtual network over time.
    • If a virtual network is receiving connectivity configurations from multiple network managers, logs are emitted separately for each network manager for their respective configuration changes.
    • If a virtual network is added to or removed from a network group that already has a connectivity configuration deployed onto it, a log is emitted for that virtual network showing the state of applied connectivity configurations.

Network group membership change attributes

This category emits one log per network group membership change. So, when a virtual network is added to or removed from a network group, a log is emitted correlating to that single addition or removal for that particular virtual network. The following attributes correspond to the logs that would be sent to your storage account; Log Analytics logs have slightly different attributes.

Attribute Description
time Date and time when the event was logged.
resourceId Resource ID of the network manager.
location Location of the virtual network resource.
operationName Operation that resulted in the virtual network being added or removed. Always the Microsoft.Network/virtualNetworks/networkGroupMembership/write operation.
category Category of this log. Always NetworkGroupMembershipChange.
resultType Indicates successful or failed operation.
correlationId GUID that can help relate or debug logs.
level Always Info.
properties Collection of properties of the log.

Within the properties attribute are several nested attributes:

properties attributes Description
Message A static message stating if a network group membership change was successful or unsuccessful.
MembershipId Default membership ID of the virtual network.
GroupMemberships Collection of what network groups the virtual network belongs to. There can be multiple NetworkGroupId and Sources listed within this property since a virtual network can belong to multiple network groups simultaneously.
MemberResourceIds Resource ID of the virtual network that was added to or removed from a network group.

Within the GroupMemberships attribute are several nested attributes:

GroupMemberships attributes Description
NetworkGroupId ID of a network group the virtual network belongs to.
Sources Collection of how the virtual network is a member of the network group.

Within the Sources attribute are several nested attributes:

Sources attributes Description
Type Denotes whether the virtual network was added manually (StaticMembership) or conditionally via Azure Policy (Policy).
StaticMemberId If the Type value is StaticMembership, this property appears.
PolicyAssignmentId If the Type value is Policy, this property appears. ID of the Azure Policy assignment that associates the Azure Policy definition to the network group.
PolicyDefinitionId If the Type value is Policy, this property appears. ID of the Azure Policy definition that contains the conditions for the network group’s membership.

Rule collection change attributes

This category emits one log per security admin rule collection change per virtual network. So, when a security admin rule collection is applied to or removed from a virtual network through its network group, a log is emitted correlating to that change in rule collection for that particular virtual network. The following attributes correspond to the logs that would be sent to your storage account; Log Analytics logs have slightly different attributes.

Attribute Description
time Date and time when the event was logged.
resourceId Resource ID of the network manager.
location Location of the virtual network resource.
operationName Operation that resulted in the virtual network being added or removed. Always the Microsoft.Network/networkManagers/securityAdminRuleCollections/write operation.
category Category of this log. Always RuleCollectionChange.
resultType Indicates successful or failed operation.
correlationId GUID that can help relate or debug logs.
level Always Info.
properties Collection of properties of the log.

Within the properties attribute are several nested attributes:

properties attributes Description
TargetResourceIds Resource ID of the virtual network that experienced a change in rule collection application.
Message A static message stating if a rule collection change was successful or unsuccessful.
AppliedRuleCollectionIds Collection of what security admin rule collections are applied to the virtual network at the time the log was emitted. There can be multiple rule collection IDs listed since a virtual network can belong to multiple network groups and have multiple rule collections applied simultaneously.

Connectivity configuration change attributes

This category emits one log per connectivity configuration change per virtual network. So, when a connectivity configuration is applied to or removed from a virtual network through its network group, a log is emitted correlating to that change in connectivity configuration set for that particular virtual network. The following attributes correspond to the logs that would be sent to your storage account; Log Analytics logs have slightly different attributes.

Attribute Description
time Date and time when the event was logged.
resourceId Resource ID of the network manager.
location Location of the virtual network resource.
operationName Operation that resulted in the virtual network being added or removed.
category Category of this log. Always ConnectivityConfigurationChange.
resultType Indicates successful or failed operation.
correlationId GUID that can help relate or debug logs.
level Info or Warning.
properties Collection of properties of the log.

Within the properties attribute are several nested attributes:

properties attributes Description
AppliedConnectivityConfigurations Collection of what connectivity configurations are applied to the virtual network at the time the log was emitted. There can be multiple connectivity configurations listed since a network group can have multiple connectivity configurations applied simultaneously, and a virtual network can belong to multiple network groups with multiple connectivity configurations applied simultaneously as well.
TargetResourceIds Resource ID of the virtual network that experienced a change in connectivity configuration application.
Message A static message stating if the connectivity configuration change was successful or unsuccessful.

Note

Connectivity configuration allows virtual networks with overlapping IP spaces within the same connected group, but communication to an overlapped IP address is dropped. In addition, when a connected group’s virtual network is peered with an external virtual network (a virtual network not in the connected group) that has overlapping address spaces, these overlapping address spaces become inaccessible within the connected group. Traffic from the peered virtual network to the overlapping address spaces is routed to the external virtual network, while traffic from other VNets in the connected group to the overlapping address spaces is dropped. Logs show a "Warning" level, with the TargetResourceIds field indicating the IDs of VNets with overlapping address spaces and a message indicating that either complete or partial address spaces are inaccessible due to overlapping addresses.

Within the AppliedConnectivityConfigurations attribute are several nested attributes:

AppliedConnectivityConfigurations attributes Description
ConfigurationId ID of a connectivity configuration applied onto the virtual network.
Topology Type of topology the connectivity configuration is intended to build among one or more network groups it's applied to. Can be Mesh or HubAndSpoke.

Accessing logs

Depending on how you consume event logs, you need to set up a Log Analytics workspace or a storage account for storing your log events.

When setting up a Log Analytics workspace or a storage account, you need to select a region. If you’re using a storage account, it must be in the same region as the virtual network manager you’re accessing logs from. If you’re using a Log Analytics workspace, it can be in any region.

The network manager accessing the events isn't required to be in the same subscription as the Log Analytics workspace or the storage account used for storage, but permissions can restrict your ability to access logs across different subscriptions.

Note

At least one virtual network must experience an event captured by the categories above in order to generate logs. A log will generate for each event a couple minutes after the change occurs.

Next steps