Share via

How to configure AZFWFlowTrace logs on Azure Firewall (Basic SKU) to debug Asymmetric routing

Charith W 0 Reputation points
2026-01-27T14:51:15.3933333+00:00

Hi, I have created a azure firewall on a VNET and i am trying to debug an issue related to asymmetric routing,

The scenario is a P2SVPN trying to communicate with a SQL Server (via private endpoint), the P2SVPN is in a hub vnet and the SQL Server is in a spoke vnet (hub vnet is peered to this spoke vnet), i believe best practice would be to route P2SVPN traffic via the firewall which i managed to do with the use of route tables however when i tried to add a route table in the private endpoint subnet (of my sql server), i was then unable to connect to my sql server at all (connection times out).

I assumed this is because of asymmetric routing ? where the response from my private endpoint is not being routed via the firewall to my P2SVPN resulting in the connection being dropped possibly and the goal is to try use AZFWFlowTrace logs to see if that is the case but unfortunately i cannot see any logs in this table even after i have configured diagnostic settings to send flow trace logs to my log analytics workspace.

Logs for other tables however, such as AZFWDnsFlowTrace and AZFWNetworkRule are displaying fine, would anyone be able to assist me with why the AZFWFlowTrace table is not filling up and also possibly a cause as to why i am unable to route a private endpoint return response via a firewall back to my P2SVPN Client ?

Azure Firewall
Azure Firewall

An Azure network security service that is used to protect Azure Virtual Network resources.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.