Skip to content

Commit 86a970f

Browse files
amee-sumojpipkin1
andauthored
Azure Security - Advisor (apps) (#5191)
* Azure Security - Advisor (app) * Azure Security - Advisor (apps) * Update docs/integrations/microsoft-azure/azure-security-advisor.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/microsoft-azure/azure-security-advisor.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/microsoft-azure/azure-security-advisor.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update blog-service/2025-03-20-apps.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]>
1 parent 749c88a commit 86a970f

File tree

9 files changed

+210
-1
lines changed

9 files changed

+210
-1
lines changed

blog-service/2025-03-20-apps.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: Azure Security - Advisor (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- azure-security-advisor
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
13+
We're excited to introduce the new Azure Security - Advisor app for Sumo Logic. By leveraging this app, security analysts can quickly assess Azure Advisor’s recommendations, track remediation progress over time, and take action to enhance the security and efficiency of their Azure infrastructure. [Learn more](/docs/integrations/microsoft-azure/azure-security-advisor/).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2824,6 +2824,7 @@
28242824
"/cid/30038": "/docs/integrations/microsoft-azure/azure-analysis-services",
28252825
"/cid/30039": "/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights",
28262826
"/cid/30040": "/docs/integrations/microsoft-azure/azure-hdinsight",
2827+
"/cid/30041": "/docs/integrations/microsoft-azure/azure-security-advisor",
28272828
"/cid/21001": "/docs/integrations/google/cloud-alloydb-for-postgresql",
28282829
"/cid/21342": "/docs/send-data/hosted-collectors/microsoft-source/azure-metrics-source",
28292830
"/cid/21343": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source",
Lines changed: 186 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,186 @@
1+
---
2+
id: azure-security-advisor
3+
title: Azure Security - Advisor
4+
description: Learn how to assess Azure Advisor’s recommendations, track remediation progress over time, and take action to enhance the security and efficiency of your Azure infrastructure.
5+
---
6+
7+
import useBaseUrl from '@docusaurus/useBaseUrl';
8+
9+
<img src={useBaseUrl('img/integrations/microsoft-azure/azure-security-advisor.png')} alt="Thumbnail icon" width="50"/>
10+
11+
The **Azure Security - Advisor** app provides security analysts visibility into Azure Advisor’s recommendations on security, reliability, operational excellence, and cost optimization. It helps organizations proactively address risks, improve the cloud infrastructure's resiliency, and optimize Azure resource use.
12+
13+
:::info
14+
This app includes [built-in monitors](#azure-security---advisor-alerts). For details on creating custom monitors, refer to [Create monitors for Azure Security - Advisor app](#create-monitors-for-the-azure-security---advisor-app).
15+
:::
16+
17+
## Log types
18+
19+
You can collect the following logs for the Azure Security - Advisor app:
20+
21+
* [Security Recommendations](https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations)
22+
* [Cost Recommendations](https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-cost-recommendations)
23+
* [Reliability Recommendations](https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-reliability-recommendations)
24+
* [Operational Excellence Recommendations](https://learn.microsoft.com/en-us/azure/advisor/advisor-reference-operational-excellence-recommendations)
25+
26+
### Sample log messages
27+
28+
<details>
29+
<summary>Recommendation</summary>
30+
31+
```json
32+
{
33+
"schemaId": "azureMonitorCommonAlertSchema",
34+
"data": {
35+
"essentials": {
36+
"alertId": "/subscriptions/11111111-1111-1111-1111-111111111/providers/Microsoft.AlertsManagement/alerts/c37da162-ef73-4621-7a47-7ad188fcf000",
37+
"alertRule": "Sumo-Advisor Inegration",
38+
"targetResourceType": "microsoft.containerservice/managedclusters",
39+
"alertRuleID": "/subscriptions/11111111-1111-1111-1111-111111111/resourceGroups/AG-SUMO/providers/microsoft.insights/activityLogAlerts/Sumo-Advisor Inegration",
40+
"severity": "Sev4",
41+
"signalType": "Activity Log",
42+
"monitorCondition": "Fired",
43+
"targetResourceGroup": "k8sjkse-azure-k8stest",
44+
"monitoringService": "Activity Log - Recommendation",
45+
"alertTargetIDs": [
46+
"/subscriptions/11111111-1111-1111-1111-111111111/resourcegroups/k8sjkse-azure-k8stest/providers/microsoft.containerservice/managedclusters/k8s-19-aks1-31-otc-dev-v4"
47+
],
48+
"configurationItems": [
49+
"k8s-19-aks1-31-otc-dev-v4"
50+
],
51+
"originAlertId": "23e7e500-ff78-6080-4a77-a1eb7f77501c_72d226723d2a3bd9e51379e34ed380ef",
52+
"firedDateTime": "2025-02-28T04:48:41.319118Z",
53+
"description": "Sumo-Advisor Inegration",
54+
"essentialsVersion": "1.0",
55+
"alertContextVersion": "1.0",
56+
"investigationLink": "https://portal.azure.com/#view/Microsoft_Azure_Monitoring_Alerts/Investigation.ReactView/alertId/%2fsubscriptions%2f11111111-1111-1111-1111-111111111%2fresourceGroups%2fk8sjkse-azure-k8stest%2fproviders%2fMicrosoft.AlertsManagement%2falerts%2fc37da162-ef73-4621-7a47-7ad188fcf000"
57+
},
58+
"alertContext": {
59+
"channels": "Operation",
60+
"claims": "{\"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress\":\"Microsoft.Advisor\"}",
61+
"caller": "Microsoft.Advisor",
62+
"correlationId": "5b3ef3ba-39b3-450c-824c-c26101c26b99",
63+
"eventSource": "Recommendation",
64+
"eventTimestamp": "2025-02-28T04:40:12.4607874+00:00",
65+
"httpRequest": "{\"clientIpAddress\":\"0.0.0.0\"}",
66+
"eventDataId": "23e7e500-ff78-6080-4a77-a1eb7f77501c",
67+
"level": "Informational",
68+
"operationName": "Microsoft.Advisor/recommendations/available/action",
69+
"operationId": "",
70+
"properties": {
71+
"recommendationSchemaVersion": "1.0",
72+
"recommendationCategory": "HighAvailability",
73+
"recommendationImpact": "High",
74+
"recommendationName": "Enable Autoscaling for your system node pools",
75+
"recommendationResourceLink": "https://portal.azure.com/#blade/Microsoft_Azure_Expert/RecommendationListBlade/source/ActivityLog/recommendationTypeId/70829b1a-272b-4728-b418-8f1a56432d33/resourceId/%2Fsubscriptions%2F11111111-1111-1111-1111-111111111%2Fresourcegroups%2Fk8sjkse-azure-k8stest%2Fproviders%2FMicrosoft.ContainerService%2FmanagedClusters%2Fk8s-19-aks1-31-otc-dev-v4",
76+
"recommendationType": "70829b1a-272b-4728-b418-8f1a56432d33"
77+
},
78+
"status": "Active",
79+
"subStatus": "",
80+
"tenantId": "",
81+
"submissionTimestamp": "2025-02-28T04:40:12.4607874+00:00",
82+
"ReceivedTime": "2025-02-28T04:46:34+00:00",
83+
"ingestionTime": "2025-02-28T04:46:37.5062562+00:00",
84+
"Activity Log Event Description": "A new recommendation is available."
85+
},
86+
"customProperties": {
87+
88+
}
89+
}
90+
}
91+
```
92+
</details>
93+
94+
### Sample queries
95+
96+
```sql title="Recommendation"
97+
_sourceCategory=azure/advisor
98+
| json field=_raw
99+
"data.alertContext.properties.recommendationResourceLink", "data.essentials.alertId", "data.alertContext.level", "data.alertContext.properties.recommendationImpact", "data.alertContext.ReceivedTime", "data.alertContext.properties.recommendationName", "data.alertContext.properties.recommendationCategory", "data.essentials.targetResourceType", "data.essentials.targetResourceGroup", "data.alertContext.tenantId", "data.essentials.investigationLink" as recommendation_link, alert_id, severity, impact, recommendation_eval_date,display_name, category,affected_resource_type, affected_resource_name, tenant_id, azure_portal_link nodrop
100+
| parse regex field=alert_id "subscriptions/(?<subscription_id>[a-f0-9\-]+)"
101+
102+
| replace(recommendation_eval_date,/(\.\d+Z)/, "") as recommendation_eval_date
103+
| replace(recommendation_eval_date,"T", " ") as date
104+
| tourl(recommendation_link,display_name) as recommendation
105+
```
106+
107+
## Setup
108+
109+
To send Azure Advisor events to Sumo Logic, you can configure the [Azure Advisor’s alert](https://learn.microsoft.com/en-us/azure/advisor/advisor-alerts-portal) with [Action group](https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/action-groups) as a webhook.
110+
111+
### Step 1: Configure Sumo Logic HTTP source
112+
113+
[Create Sumo Logic HTTP source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-1-configure-an-http-source) and make a note of the HTTP URL.
114+
115+
### Step 2: Create an Azure Advisor alert
116+
117+
Refer to [Create Azure Advisor alerts in the Azure portal](https://learn.microsoft.com/en-us/azure/advisor/advisor-alerts-portal) to configure an Azure Advisor alert for Sumo Logic.
118+
Sumo Logic recommends you to select the **Category and impact level** option in the **Condition** section while creating the alert.
119+
<img src={useBaseUrl('img/integrations/microsoft-azure/create-advisor-alert.png')} alt="Edit Advisor alert" style={{border: '1px solid gray'}} width="800" />
120+
121+
### Step 3: Create an action group
122+
123+
Refer to [Create an action group in the Azure portal](https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/action-groups#create-an-action-group-in-the-azure-portal) to create an action group for the Azure Advisor alert in step 2.
124+
125+
Sumo Logic recommends you to select the **Action type** as **Webhook** and then provide the Sumo Logic HTTP Source URL that you collected from step 1.
126+
<img src={useBaseUrl('img/integrations/microsoft-azure/create-action-group.png')} alt="Create an action group" style={{border: '1px solid gray'}} width="800" />
127+
128+
## Installing the Azure Security - Advisor app
129+
130+
This section shows you how to install the Azure Security - Advisor app for Sumo Logic.
131+
132+
import AppInstall from '../../reuse/apps/app-install.md';
133+
134+
<AppInstall/>
135+
136+
## Viewing the Azure Security - Advisor dashboards
137+
138+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
139+
140+
<ViewDashboards/>
141+
142+
### Advisor Security Recommendations
143+
144+
The **Azure Security - Advisor Security Recommendations** dashboard provides security analysts with insights into security recommendations from Azure Advisor, categorized by severity (high, medium, low) to help prioritize risks. It highlights affected resource types and assets, enabling quick identification of vulnerabilities. A trend analysis graph visualizes recommendation patterns over time, tracking improvements and recurring risks. The Top Action Plan section lists prioritized recommendations with timestamps and affected resources for efficient remediation. Additionally, a summary of recommendations offers a broader view of risks across Azure services, helping security teams enhance their security posture and mitigate vulnerabilities.<br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Security+Recommendations.png')} alt="Advisor Security Recommendations" style={{border: '1px solid gray'}} width="800" />
145+
146+
### Advisor Cost Recommendations
147+
148+
The **Azure Security - Advisor Cost Recommendations** dashboard provides security analysts with cost optimization strategies for Azure, helping identify idle and underutilized resources to reduce cloud spending. It categorizes recommendations by impact level, highlighting priority areas for cost-saving actions. The Affected Resources panel identifies services, such as compute disks, that may benefit from resizing or deallocation. A timeline visualization tracks cost recommendations over time to monitor trends and assess optimization effectiveness. The Cost Recommendation Summary details recommendations, their impact, and associated resources, aiding informed decision-making. This dashboard helps maintain financial efficiency while ensuring optimal resource utilization in Azure.<br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Cost+Recommendations.png')} alt="Advisor Cost Recommendations" style={{border: '1px solid gray'}} width="800" />
149+
150+
### Advisor Reliability Recommendations
151+
152+
The **Azure Security - Advisor Reliability Recommendations** dashboard provides security analysts with insights into reliability risks affecting business-critical applications. It categorizes recommendations by severity (high, medium, low) to help prioritize reliability concerns. The dashboard highlights affected resource types and assets for quick identification of infrastructure issues. A timeline visualization tracks recommendation trends, offering insights into recurring risks. The Top Action Plan section lists prioritized recommendations with timestamps and affected resources for efficient remediation. Additionally, the Security Recommendation Summary provides an overview of reliability risks across Azure services. This dashboard helps security teams enhance system resilience, minimize downtime, and ensure optimal application performance. <br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Reliability+Recommendations.png')} alt="Advisor Reliability Recommendations" style={{border: '1px solid gray'}} width="800" />
153+
154+
### Advisor Operational Excellence Recommendations
155+
156+
The **Azure Security - Advisor Operational Excellence Recommendations** dashboard provides security analysts with insights into optimizing process workflows, enhancing resource manageability, and enforcing deployment best practices. It categorizes recommendations by impact (medium and low) to help prioritize improvements for streamlining cloud operations. The Affected Resources panel highlights impacted services, with a focus on Azure Kubernetes Service (AKS) clusters. A timeline visualization tracks trends in recommendations over time, offering a historical perspective on operational issues. The Recommendation Summary details specific recommendations and associated resources for targeted action. This dashboard helps security teams improve system reliability and maintain efficient cloud operations.<br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Azure+Security+Advisor/Azure+Security++-+Advisor+Operational+Excellence+Recommendations.png')} alt="Advisor Operational Excellence Recommendations" style={{border: '1px solid gray'}} width="800" />
157+
158+
## Create monitors for the Azure Security - Advisor app
159+
160+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
161+
162+
<CreateMonitors/>
163+
164+
### Azure Security - Advisor alerts
165+
166+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
167+
|:--|:--|:--|:--|
168+
| `High Impact Alert` | This alert is triggered when new high-impact advisories are generated, enabling security analysts to take immediate action to mitigate risks and maintain system integrity. The High Impact alert for Azure Advisor in Sumo Logic detects security, reliability, operational, or cost-related recommendations classified as high impact. These recommendations indicate critical risks that could significantly affect the security, performance, or efficiency of your Azure environment. | Critical | Count > 0 |
169+
170+
## Upgrade/Downgrade the Azure Security - Advisor app (optional)
171+
172+
import AppUpdate from '../../reuse/apps/app-update.md';
173+
174+
<AppUpdate/>
175+
176+
## Uninstalling the Azure Security - Advisor app (optional)
177+
178+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
179+
180+
<AppUninstall/>
181+
182+
## Troubleshooting
183+
184+
### HTTP Logs and Metrics Source used by Azure Functions
185+
186+
To troubleshoot metrics collection, follow the instructions in [Collect Metrics from Azure Monitor > Troubleshooting metrics collection](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#troubleshooting-metrics-collection).

docs/integrations/microsoft-azure/index.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -268,6 +268,13 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
268268
<p>A guide to the Sumo Logic integration for Azure Relay.</p>
269269
</div>
270270
</div>
271+
<div className="box smallbox card">
272+
<div className="container">
273+
<img src={useBaseUrl('img/integrations/microsoft-azure/azure-security-advisor.png')} alt="Thumbnail icon" width="60"/>
274+
<h4><a href="/docs/integrations/microsoft-azure/azure-security-advisor">Azure Security - Advisor</a></h4>
275+
<p>A guide to the Sumo Logic integration for Azure Security - Advisor.</p>
276+
</div>
277+
</div>
271278
<div className="box smallbox card">
272279
<div className="container">
273280
<a href="/docs/integrations/microsoft-azure/azure-security-defender-for-cloud"><img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-cloud.png')} alt="thumbnail icon" width="75"/><h4>Azure Security - Defender for Cloud</h4></a>

0 commit comments

Comments
 (0)