Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I believe this is the expected logs.
Azure Firewall a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
See : Azure Firewall FAQ
- This means, a Network Rule allows a "flow"
- i.e., DNS queries happening are of a single flow and only the outgoing "flow" detail would be logged, not the individual packets.
- Each new "connection" that matches one of your configured network rules results in a log for the accepted/denied connection, not the individual packets going to and fro inside a connection.
This is the case with any connection in Azure Firewall, not only DNS.
Also see,
If you are using DNS over TCP and would like to dig deep with the logs, you can consider using Flow trace logs
Contains flow information, flags, and the time period when the flows were recorded. You can see full flow information such as SYN, SYN-ACK, FIN, FIN-ACK, RST, INVALID (flows).
Kindly let us know if this helps or you need further assistance on this issue.
Thanks,
Kapil
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.