title | description | services | documentationcenter | author | manager | editor | ms.service | ms.devlang | ms.topic | ms.tgt_pltfrm | ms.workload | ms.date | ms.author |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Check connectivity with Azure Network Watcher - Azure CLI 2.0 | Microsoft Docs |
This page explains how to use connectivity check with Network Watcher using Azure CLI 2.0 |
network-watcher |
na |
jimdial |
timlt |
network-watcher |
na |
article |
na |
infrastructure-services |
07/11/2017 |
jdial |
[!div class="op_single_selector"]
Learn how to use connectivity to verify if a direct TCP connection from a virtual machine to a given endpoint can be established.
This article assumes you have the following resources:
-
An instance of Network Watcher in the region you want to check connectivity.
-
Virtual machines to check connectivity with.
[!INCLUDE network-watcher-preview]
Important
Connectivity check requires a virtual machine extension AzureNetworkWatcherExtension
. For installing the extension on a Windows VM visit Azure Network Watcher Agent virtual machine extension for Windows and for Linux VM visit Azure Network Watcher Agent virtual machine extension for Linux.
Connectivity check is currently in public preview, to use this feature it needs to be registered. To do this, run the following CLI sample
az feature register --namespace Microsoft.Network --name AllowNetworkWatcherConnectivityCheck
az provider register --namespace Microsoft.Network
To verify the registration was successful, run the following CLI command:
az feature show --namespace Microsoft.Network --name AllowNetworkWatcherConnectivityCheck
If the feature was properly registered, the output should match the following:
{
"id": "/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Features/providers/Microsoft.Network/features/AllowNetworkWatcherConnectivityCheck",
"name": "Microsoft.Network/AllowNetworkWatcherConnectivityCheck",
"properties": {
"state": "Registered"
},
"type": "Microsoft.Features/providers/features"
}
This example checks connectivity to a destination virtual machine over port 80.
az network watcher test-connectivity --resource-group ContosoRG --source-resource MultiTierApp0 --dest-resource Database0 --dest-port 80
The following response is from the previous example. In this response, the ConnectionStatus
is Unreachable. You can see that all the probes sent failed. The connectivity failed at the virtual appliance due to a user-configured NetworkSecurityRule
named UserRule_Port80, configured to block incoming traffic on port 80. This information can be used to research connection issues.
{
"avgLatencyInMs": null,
"connectionStatus": "Unreachable",
"hops": [
{
"address": "10.1.1.4",
"id": "bb01d336-d881-4808-9fbc-72f091974d68",
"issues": [],
"nextHopIds": [
"f8b074e9-9980-496b-a35e-619f9bcbf648"
],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/ap
pNic0/ipConfigurations/ipconfig1",
"type": "Source"
},
{
"address": "10.1.2.4",
"id": "f8b074e9-9980-496b-a35e-619f9bcbf648",
"issues": [],
"nextHopIds": [
"8a5857f3-6ab8-4b11-b9bf-a046d66b8696"
],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/fw
Nic/ipConfigurations/ipconfig1",
"type": "VirtualAppliance"
},
{
"address": "10.1.3.4",
"id": "8a5857f3-6ab8-4b11-b9bf-a046d66b8696",
"issues": [
{
"context": [
{
"key": "RuleName",
"value": "UserRule_Port80"
}
],
"origin": "Outbound",
"severity": "Error",
"type": "NetworkSecurityRule"
}
],
"nextHopIds": [
"6ce2f7a2-ceb4-4145-80e8-5d9f661655d6"
],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/au
Nic/ipConfigurations/ipconfig1",
"type": "VirtualAppliance"
},
{
"address": "10.1.4.4",
"id": "6ce2f7a2-ceb4-4145-80e8-5d9f661655d6",
"issues": [],
"nextHopIds": [],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/db
Nic0/ipConfigurations/ipconfig1",
"type": "VnetLocal"
}
],
"maxLatencyInMs": null,
"minLatencyInMs": null,
"probesFailed": 100,
"probesSent": 100
}
The example checks connectivity between a virtual machine and a remote endpoint.
az network watcher test-connectivity --resource-group ContosoRG --source-resource MultiTierApp0 --dest-address 13.107.21.200 --dest-port 80
In the following example, the connectionStatus
is shown as Unreachable. In the hops
details, you can see under issues
that the traffic was blocked due to a UserDefinedRoute
.
{
"avgLatencyInMs": null,
"connectionStatus": "Unreachable",
"hops": [
{
"address": "10.1.1.4",
"id": "f2cb1868-2049-4839-b8ed-57a480d06f95",
"issues": [
{
"context": [
{
"key": "RouteType",
"value": "User"
}
],
"origin": "Outbound",
"severity": "Error",
"type": "UserDefinedRoute"
}
],
"nextHopIds": [
"da4022db-0ab0-48c4-a507-dd4c03561ca5"
],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/ap
pNic0/ipConfigurations/ipconfig1",
"type": "Source"
},
{
"address": "13.107.21.200",
"id": "da4022db-0ab0-48c4-a507-dd4c03561ca5",
"issues": [],
"nextHopIds": [],
"resourceId": "Unknown",
"type": "Destination"
}
],
"maxLatencyInMs": null,
"minLatencyInMs": null,
"probesFailed": 100,
"probesSent": 100
}
The following example checks the connectivity to a website.
az network watcher test-connectivity --resource-group ContosoRG --source-resource MultiTierApp0 --dest-address http://bing.com --dest-port 80
In the following response, you can see the connectionStatus
shows as Reachable. When a connection is successful, latency values are provided.
{
"avgLatencyInMs": 2,
"connectionStatus": "Reachable",
"hops": [
{
"address": "10.1.1.4",
"id": "639c2d19-e163-4dfd-8737-5018dd1168ae",
"issues": [],
"nextHopIds": [
"fd43a6e7-c758-4f48-90aa-8db99105a4a3"
],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/ap
pNic0/ipConfigurations/ipconfig1",
"type": "Source"
},
{
"address": "204.79.197.200",
"id": "fd43a6e7-c758-4f48-90aa-8db99105a4a3",
"issues": [],
"nextHopIds": [],
"resourceId": "Internet",
"type": "Internet"
}
],
"maxLatencyInMs": 7,
"minLatencyInMs": 0,
"probesFailed": 0,
"probesSent": 100
}
The following example checks the connectivity from a virtual machine to a blog storage account.
az network watcher test-connectivity --resource-group ContosoRG --source-resource MultiTierApp0 --dest-address https://contosoexamplesa.blob.core.windows.net/
The following json is the example response from running the previous cmdlet. As the check is successful, the connectionStatus
property shows as Reachable. You are provided the details regarding the number of hops required to reach the storage blob and latency.
{
"avgLatencyInMs": 1,
"connectionStatus": "Reachable",
"hops": [
{
"address": "10.1.1.4",
"id": "5136acff-bf26-4c93-9966-4edb7dd40353",
"issues": [],
"nextHopIds": [
"f8d958b7-3636-4d63-9441-602c1eb2fd56"
],
"resourceId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/ContosoRG/providers/Microsoft.Network/networkInterfaces/appNic0/ipConfigurations/ipconfig1",
"type": "Source"
},
{
"address": "1.2.3.4",
"id": "f8d958b7-3636-4d63-9441-602c1eb2fd56",
"issues": [],
"nextHopIds": [],
"resourceId": "Internet",
"type": "Internet"
}
],
"maxLatencyInMs": 7,
"minLatencyInMs": 0,
"probesFailed": 0,
"probesSent": 100
}
Learn how to automate packet captures with Virtual machine alerts by viewing Create an alert triggered packet capture
Find if certain traffic is allowed in or out of your VM by visiting Check IP flow verify