Skip to content

Commit c714c09

Browse files
Merge pull request #263814 from haim-na/haim-na/sentinel-logstash-plugin-jan24
Sentinel DCR based Logstash plugin update
2 parents e82ee79 + a3c0c7b commit c714c09

File tree

1 file changed

+24
-0
lines changed

1 file changed

+24
-0
lines changed

articles/sentinel/connect-logstash-data-connection-rules.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -392,6 +392,7 @@ After you retrieve the required values:
392392

393393
|Field |Description |Default value |
394394
|---------|---------|---------|
395+
|`azure_cloud` |Used to specify the name of the Azure cloud that is being used, Available values are: `AzureCloud`, `AzureChinaCloud`, and `AzureUSGovernment`. | `AzureCloud` |
395396
|`key_names` |An array of strings. Provide this field if you want to send a subset of the columns to Log Analytics. |None (field is empty) |
396397
|`plugin_flush_interval` |Defines the maximal time difference (in seconds) between sending two messages to Log Analytics. |`5` |
397398
|`retransmission_time` |Sets the amount of time in seconds for retransmitting messages once sending failed. |`10` |
@@ -444,6 +445,29 @@ To monitor the connectivity and activity of the Microsoft Sentinel output plugin
444445

445446
If you are not seeing any data in this log file, generate and send some events locally (through the input and filter plugins) to make sure the output plugin is receiving data. Microsoft Sentinel will support only issues relating to the output plugin.
446447

448+
449+
### Network security
450+
Define network settings and enable network isolation for Microsoft Sentinel Logstash output plugin.
451+
452+
#### Virtual network service tags
453+
454+
Microsoft Sentinel output plugin supports [Azure virtual network service tags](/azure/virtual-network/service-tags-overview). Both *AzureMonitor* and *AzureActiveDirectory* tags are required.
455+
456+
Azure Virtual Network service tags can be used to define network access controls on [network security groups](/azure/virtual-network/network-security-groups-overview#security-rules), [Azure Firewall](/azure/firewall/service-tags), and user-defined routes. Use service tags in place of specific IP addresses when you create security rules and routes. For scenarios where Azure Virtual Network service tags cannot be used, the firewall requirements are given below.
457+
458+
#### Firewall requirements
459+
460+
The following table lists the firewall requirements for scenarios where Azure virtual network service tags can't be used.
461+
462+
| Cloud |Endpoint |Purpose |Port |Direction |Bypass HTTPS inspection|
463+
|------|------|------|---------|--------|--------|
464+
| Azure Commercial |https://login.microsoftonline.com |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
465+
| Azure Commercial |`https://<data collection endpoint name>.<Azure cloud region>.ingest.monitor.azure.com`| Data collection Endpoint|Port 443 |Outbound|Yes |
466+
| Azure Government |https://login.microsoftonline.us |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
467+
| Azure Government |Replace '.com' above with '.us' | Data collection Endpoint|Port 443 |Outbound|Yes |
468+
| Microsoft Azure operated by 21Vianet |https://login.chinacloudapi.cn |Authorization server (the Microsoft identity platform)|Port 443 |Outbound|Yes |
469+
| Microsoft Azure operated by 21Vianet |Replace '.com' above with '.cn' | Data collection Endpoint|Port 443 |Outbound|Yes |
470+
447471
## Limitations
448472

449473
- Ingestion into standard tables is limited only to [standard tables supported for custom logs ingestion](data-transformation.md#data-transformation-support-for-custom-data-connectors).

0 commit comments

Comments
 (0)