Splunk Enterprise

Azure Firewall Logs Issue

MeWoW
Loves-to-Learn Lots

Hi Splunk Community,

I’ve set up Azure Firewall logging, selecting all firewall logs and archiving them to a storage account (Event Hub was avoided due to cost concerns). The configuration steps taken are as follows:

Log Archival:

  • All Azure Firewall logs are set to archive in a storage account

Microsoft Cloud Add-On

  • I added the storage account to the Microsoft Cloud Add-On using the secret key with the following permissions:
Input/ActionAPIPermissionsRole (IAM)Default Sourcetype(s) / Sources
Azure Storage Table
Azure Storage Blob
N/AAccess key  OR
Shared Access Signature:
  - Allowed services: Blob, Table
  - Allowed resource types: Service, Container, Object
  - Allowed permissions: Read, List
N/Amscs:storage:blob (Received this)
mscs:storage:blob:json
mscs:storage:blob:xml
mscs:storage:table

We are receiving events from the source files in JSON format, but there are two issues:

Field Extraction:

  • Critical fields such as protocol, action, source, destination, etc., are not being identified.

Incomplete Logs:

  • Logs appear truncated, starting with partial data (e.g., “urceID:…”) and missing “Reso,” which implies dropped or incomplete events (As far as I understand)

Few logs were received compared to the traffic on Azure Firewall. Attached is a piece of logs showing errors as mentioned in the question.

Azure Firewall.png

________________________________________________________________

Environment Details: 

•	Log Collector: Heavy Forwarder (HF) hosted in Azure.
•	Data Flow: Logs are being forwarded to Splunk Cloud  

 Questions:

  1. Can it be an issue with using storage accounts and not event-hub?
  2. Could the incomplete logs be due to a configuration issue with the Microsoft Cloud Add-On or possibly related to the data transfer between the storage account and Splunk?
  3. Has anyone encountered similar issues with field extraction from Azure Firewall JSON logs?

Ultimate Goal:

Receive Azure Firewall Logs with fields extracted as any other firewall logs received by Syslog (Fortinet for example)

Any guidance or troubleshooting suggestions would be much appreciated!

 

Labels (3)
Tags (3)
0 Karma

MeWoW
Loves-to-Learn Lots

Splunk Support Update:
Regarding your question about the best way to ingest Azure Firewall logs into Splunk, I would recommend using Event Hub for this purpose. Event Hub allows you to stream real-time data, which is ideal for continuous log ingestion. On the other hand, using Storage Blob as an input can lead to delays, especially as log sizes increase, and could also result in data duplication.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

As usual, there might probably be more than one solution to a problem (in your case - ingestion of Azure Firewall logs). True, Event Hub will give you a near-realtime (it's not strictly realtime since it's pull-based as far as I remember) but the storage-based method might be cheaper and if you're ok with the latency it might be sufficient.

Your original problems were most probably caused by misconfigured sourcetype. The input data was not broken into events properly and/or the events were to long and got truncated.

As a result json extractions didn't happen because the events were not well-formed jsons.

0 Karma

MeWoW
Loves-to-Learn Lots

Thank you for your input. Might be the line breaker field that is causing this. 

In addition, the amount of events received is low taking into consideration it's an Azure Firewall with 10-15 GB Daily of logs.

0 Karma

PickleRick
SplunkTrust
SplunkTrust

That's to be expected as well. If your input is not broken into single events properly you might end up with a small number of huge data blobs (effectively consisting of several "atomic" events). Since they'd get cut off at TRUNCATE point, all the data following that point would be lost.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...