Hi Splunk Community,
I’ve set up Azure Firewall logging, selecting all firewall logs and archiving them to a storage account (Event Hub was avoided due to cost concerns). The configuration steps taken are as follows:
Log Archival:
Microsoft Cloud Add-On
Input/Action | API | Permissions | Role (IAM) | Default Sourcetype(s) / Sources |
Azure Storage Table Azure Storage Blob | N/A | Access key OR Shared Access Signature: - Allowed services: Blob, Table - Allowed resource types: Service, Container, Object - Allowed permissions: Read, List | N/A | mscs:storage:blob ✅ (Received this) mscs:storage:blob:json ❌ mscs:storage:blob:xml❌ mscs:storage:table❌ |
We are receiving events from the source files in JSON format, but there are two issues:
Field Extraction:
Incomplete Logs:
Few logs were received compared to the traffic on Azure Firewall. Attached is a piece of logs showing errors as mentioned in the question.
________________________________________________________________
Environment Details:
• Log Collector: Heavy Forwarder (HF) hosted in Azure. • Data Flow: Logs are being forwarded to Splunk Cloud
Questions:
Ultimate Goal:
Receive Azure Firewall Logs with fields extracted as any other firewall logs received by Syslog (Fortinet for example)
Any guidance or troubleshooting suggestions would be much appreciated!