Splunk Enterprise

Azure Firewall Logs Issue

MeWoW
Loves-to-Learn Lots

Hi Splunk Community,

I’ve set up Azure Firewall logging, selecting all firewall logs and archiving them to a storage account (Event Hub was avoided due to cost concerns). The configuration steps taken are as follows:

Log Archival:

  • All Azure Firewall logs are set to archive in a storage account

Microsoft Cloud Add-On

  • I added the storage account to the Microsoft Cloud Add-On using the secret key with the following permissions:
Input/ActionAPIPermissionsRole (IAM)Default Sourcetype(s) / Sources
Azure Storage Table
Azure Storage Blob
N/AAccess key  OR
Shared Access Signature:
  - Allowed services: Blob, Table
  - Allowed resource types: Service, Container, Object
  - Allowed permissions: Read, List
N/Amscs:storage:blob (Received this)
mscs:storage:blob:json
mscs:storage:blob:xml
mscs:storage:table

We are receiving events from the source files in JSON format, but there are two issues:

Field Extraction:

  • Critical fields such as protocol, action, source, destination, etc., are not being identified.

Incomplete Logs:

  • Logs appear truncated, starting with partial data (e.g., “urceID:…”) and missing “Reso,” which implies dropped or incomplete events (As far as I understand)

Few logs were received compared to the traffic on Azure Firewall. Attached is a piece of logs showing errors as mentioned in the question.

Azure Firewall.png

________________________________________________________________

Environment Details: 

•	Log Collector: Heavy Forwarder (HF) hosted in Azure.
•	Data Flow: Logs are being forwarded to Splunk Cloud  

 Questions:

  1. Can it be an issue with using storage accounts and not event-hub?
  2. Could the incomplete logs be due to a configuration issue with the Microsoft Cloud Add-On or possibly related to the data transfer between the storage account and Splunk?
  3. Has anyone encountered similar issues with field extraction from Azure Firewall JSON logs?

Ultimate Goal:

Receive Azure Firewall Logs with fields extracted as any other firewall logs received by Syslog (Fortinet for example)

Any guidance or troubleshooting suggestions would be much appreciated!

 

Labels (3)
Tags (3)
0 Karma
Get Updates on the Splunk Community!

Cloud Platform & Enterprise: Classic Dashboard Export Feature Deprecation

As of Splunk Cloud Platform 9.3.2408 and Splunk Enterprise 9.4, classic dashboard export features are now ...

Explore the Latest Educational Offerings from Splunk (November Releases)

At Splunk Education, we are committed to providing a robust learning experience for all users, regardless of ...

New This Month in Splunk Observability Cloud - Metrics Usage Analytics, Enhanced K8s ...

The latest enhancements across the Splunk Observability portfolio deliver greater flexibility, better data and ...