All Apps and Add-ons

Azure Storage Account Authentication

rfolkert
Engager

Right now it looks like Splunk only allows 2 methods to access an Azure Storage account (ASA) \ logs$ container; namely, generating a SAS or providing the an actual shared key. Our preference would be RBAC with a service principle. Does Splunk support this method?
• Generating a SAS, although granular, makes key management a nightmare. Every time ASA keys are regenerating, the SAS become invalid.
• Using ASA keys is not preferred due to the admin level of rights this would give Splunk.
• App/SP with RBAC is less granular, but easy to manage.

Is there any other methodology Splunk support might recommend? Or a different way keys might be managed?

mgoerlich
Engager

+1 on this one. Tried to work around it by using a user delegation token on the $logs container, but sadly the Web UI checks access in a way that causes issues right here (why does it even have to do that!?). Maybe it would work if one pasted the token into the config files directly? I sadly can't try it as I don't have access to the server myself...

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...