Trouble shoot secure routing from a container app service from 1 VNET in a closed resource group to another app service in closed VNET in the same subscription that are both peered to the same connectivity hub, with custom firewall and DNS configurations.

Aidan Rundell 0 Reputation points
2025-09-24T00:02:58.6666667+00:00

Need help troubleshooting secure routing from a container app service from 1 VNET in a closed resource group to another app service in a different closed VNET both within the same subscription that are peered to a single connectivity hub, with custom firewall and DNS configurations connecting them all.

The firewall connectivity has been setup by our MSP and the calls are resolving (DNS records are resolving to an IP address) but how can I see the traffic movements from the container through to the firewall and where the traffic is heading?

Azure Network Watcher
Azure Network Watcher
An Azure service that is used to monitor, diagnose, and gain insights into network performance and health.
{count} votes

1 answer

Sort by: Most helpful
  1. Priya ranjan Jena 1,510 Reputation points Microsoft External Staff Moderator
    2025-09-26T10:51:26.77+00:00

    Hi Aidan Rundell

    Thank you for reaching out to the Microsoft Q&A forum.

    To see the traffic movements from the container through to the firewall and where the traffic is heading?

    You can...

    Enable Virtual Network Flow Logs to monitor traffic at the VNET level:

    • Logs include source/destination IPs, ports, protocols, and flow states.
    • You can export logs to SIEM tools or visualize them in dashboards.
    • Flow logs help identify blocked traffic, encryption status, and throughput

    Reference link to follow:https://free.blessedness.top/en-us/azure/network-watcher/vnet-flow-logs-overview?tabs=Americas

    Ensure your container app subnet has a UDR that routes all outbound traffic to the firewall:

    • Address prefix: 0.0.0.0/0
    • Next hop type: Virtual appliance
    • Next hop address: Firewall’s private IP

    Reference link to follow:https://free.blessedness.top/en-us/azure/container-apps/use-azure-firewall

    Configure Application Rules or Network Rules in Azure Firewall:

    Allow traffic to required FQDNs (e.g., mcr.microsoft.com, *.blob.core.windows.net) or service tags (e.g., AzureContainerRegistry, AzureKeyVault)

    Verify with curl

    curl -s https://mcr.microsoft.com
    
    
    

    If allowed, you’ll get a response.

    If blocked, no response indicates firewall enforcement is working.

    Enable Monitoring and Diagnostics

    • Go to Azure Firewall → Logs → Application rule log data.
    • Enable AzureFirewallApplicationRule logging.
    • Use these logs to trace outbound requests and verify rule hits

    Reference link to follow: https://free.blessedness.top/en-us/azure/app-service/network-secure-outbound-traffic-azure-firewall

    If you find this comment helpful, please “up-vote” for the information provided , this can be beneficial to community members.

    Kindly let us know if you have any additional questions.

    Thanks

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.