Skip to content

Commit ffc0ded

Browse files
sachin-sumologicamee-sumojpipkin1sumoanema
authored
Updated doc for azure virtual network (#5532)
* updated doc for azure virtual network * removed metric rule and metric collection setup for vnet app * updated with new v2 app installation process * removed FER * Update docs/integrations/microsoft-azure/azure-virtual-network.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/microsoft-azure/azure-virtual-network.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: Amee Lepcha <[email protected]> Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> Co-authored-by: Alekh Nema <[email protected]>
1 parent a0a385c commit ffc0ded

File tree

1 file changed

+27
-71
lines changed

1 file changed

+27
-71
lines changed

docs/integrations/microsoft-azure/azure-virtual-network.md

Lines changed: 27 additions & 71 deletions
Original file line numberDiff line numberDiff line change
@@ -95,76 +95,11 @@ You must explicitly enable diagnostic settings and network flow logs for each Vi
9595

9696
When you configure the event hubs source or HTTP source, plan your source category to ease the querying process. A hierarchical approach allows you to make use of wildcards. For example: `Azure/VirtualNetwork/Metrics` and `Azure/VirtualNetwork/Logs`.
9797

98-
### Configure field in field schema
99-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Fields**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Fields**. You can also click the **Go To...** menu at the top of the screen and select **Fields**.
100-
1. Search for the following fields:
101-
- `tenant_name`. This field is tagged at the collector level and users can get the tenant name using the instructions [here](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tenant-management-read-tenant-name#get-your-tenant-name).
102-
- `location`. The region to which the resource name belongs.
103-
- `subscription_id`. Id associated with a subscription where the resource is present.
104-
- `resource_group`. The resource group name where the Azure resource is present.
105-
- `provider_name`. Azure resource provider name (for example, Microsoft.Storage).
106-
- `resource_type`. Azure resource type (for example, storageaccounts).
107-
- `resource_name`. The name of the resource (for example, storage account name).
108-
109-
3. Create the fields if it is not present. Refer to [create and manage fields](/docs/manage/fields/#manage-fields).
110-
111-
### Configure Field Extraction Rules
112-
113-
Create a Field Extraction Rule (FER) for Azure Virtual Network by following the instructions [here](/docs/manage/field-extractions/create-field-extraction-rule/).
114-
115-
* **Target Resource Extraction FER**
116-
117-
```sql
118-
Rule Name: AzureVirtualNetworkTargetResourceIdExtractionFER
119-
Applied at: Ingest Time
120-
Scope (Specific Data): tenant_name=* FlowLogFlowEvent
121-
```
122-
123-
```sql title="Parse Expression"
124-
json field=_raw "target_resource_id", "category", "flow_log_resource_id"
125-
| where category="FlowLogFlowEvent"
126-
| toUpperCase(target_resource_id) as target_resource_id
127-
| parse field=target_resource_id "/SUBSCRIPTIONS/*/RESOURCEGROUPS/*/PROVIDERS/*/*/*" as subscription_id, resource_group, provider_name, resource_type, resource_name
128-
| parse field=resource_name "*/SUBNETS/*" as vnet_name, subnet_name nodrop
129-
| parse field=flow_log_resource_id "NETWORKWATCHERS/NETWORKWATCHER_*/" as region_name nodrop
130-
| if (!isBlank(region_name), toLowerCase(region_name), "global") as location
131-
| if (resource_name matches /SUBNETS/, "SUBNETS", resource_type) as resource_type
132-
| fields subscription_id, location, provider_name, resource_group, resource_type, resource_name
133-
```
134-
135-
### Configure metric rules
136-
137-
* **Azure Observability Metadata Extraction Azure Virtual Network**
138-
139-
In case this rule already exists, then no need to create it again.
140-
```sql
141-
Rule Name: AzureObservabilityMetadataExtractionAzureVirtualNetwork
142-
```
143-
144-
```sql title="Metric match expression"
145-
resourceId=/SUBSCRIPTIONS/*/RESOURCEGROUPS/*/PROVIDERS/MICROSOFT.NETWORK/VIRTUALNETWORKS/* tenant_name=*
146-
```
147-
| Fields extracted | Metric rule |
148-
|------------------|----------------|
149-
| subscription_id | $resourceId._1 |
150-
| resource_group | $resourceId._2 |
151-
| provider_name | MICROSOFT.NETWORK |
152-
| resource_type | VIRTUALNETWORKS |
153-
| resource_name | $resourceId._3 |
154-
15598
### Configure metrics collection
15699

157-
In this section, you will configure a pipeline for shipping metrics from Azure Monitor to an Event Hub, onto an Azure Function, and finally to an HTTP Source on a hosted collector in Sumo Logic. This step is required only for DDOS related metrics which comes after enabling DDOS protection in your virtual network.
100+
import MetricsSourceBeta from '../../reuse/metrics-source-beta.md';
158101

159-
1. Create a hosted collector and tag `tenant_name` field. <br/><img src={useBaseUrl('img/integrations/microsoft-azure/Azure-Storage-Tag-Tenant-Name.png')} alt="Azure Storage Tag Tenant Name" style={{border: '1px solid gray'}} width="800" />
160-
2. [Configure an HTTP Source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-1-configure-an-http-source).
161-
1. [Configure and deploy the ARM Template](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-2-configure-azure-resources-using-arm-template).
162-
1. [Export metrics to Event Hub](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-3-export-metrics-for-a-particular-resource-to-event-hub). Perform the steps below for each storage service (blob, queue, table, and file) and each storage account that you want to monitor.
163-
* Choose `Stream to an event hub` as the destination.
164-
* Select `AllMetrics`.
165-
* Use the Event hub namespace created by the ARM template in Step 2 above. You can create a new Event hub or use the one created by the ARM template. You can use the default policy `RootManageSharedAccessKey` as the policy name.
166-
4. Tag the location field in the source with the right location value.<br/><img src={useBaseUrl('img/integrations/microsoft-azure/Azure-Storage-Tag-Location.png')} alt="Azure Storage Tag Location" style={{border: '1px solid gray'}} width="500" />
167-
5. Enable the `DDOS protection` by following the instructions in Azure [documentation](https://learn.microsoft.com/en-us/azure/ddos-protection/manage-ddos-protection#enable-for-an-existing-virtual-network)
102+
<MetricsSourceBeta/>
168103

169104
### Configure logs collection
170105

@@ -241,15 +176,29 @@ In order to find virtual networks without any flow log resource, you can audit f
241176

242177
Now that you have set up data collection, install the Azure Virtual Network Sumo Logic app to use the pre-configured [dashboards](#viewing-the-azure-virtual-network-app-dashboards) that provide visibility into your environment for real-time analysis of overall usage.
243178

244-
import AppInstallNoDataSourceV2 from '../../reuse/apps/app-install-index-apps-v2.md';
179+
import AppInstallIndexV2 from '../../reuse/apps/app-install-index-option.md';
180+
181+
<AppInstallIndexV2/>
245182

246-
<AppInstallNoDataSourceV2/>
183+
As part of the app installation process, the following fields will be created by default:
184+
185+
- `tenant_name`. This field is tagged at the collector level. You can get the tenant name using the instructions [here](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tenant-management-read-tenant-name#get-your-tenant-name).
186+
- `location`. The region the resource name belongs to.
187+
- `subscription_id`. ID associated with a subscription where the resource is present.
188+
- `resource_group`. The resource group name where the Azure resource is present.
189+
- `provider_name`. Azure resource provider name (for example, Microsoft.Network).
190+
- `resource_type`. Azure resource type (for example, storage accounts).
191+
- `resource_name`. The name of the resource (for example, storage account name).
192+
- `service_type`. Type of the service that can be accessed with an Azure resource.
193+
- `service_name`. Services that can be accessed with an Azure resource (for example, in Azure Container Instances the service is Subscriptions).
194+
195+
Also FER `AzureVirtualNetworkTargetResourceIdExtractionFER` will be created as part of the app installation process itself.
247196

248197
## Viewing the Azure Virtual Network app dashboards
249198

250-
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
199+
import ViewDashboardsIndex from '../../reuse/apps/view-dashboards-index.md';
251200

252-
<ViewDashboards/>
201+
<ViewDashboardsIndex/>
253202

254203
### Overview
255204

@@ -321,6 +270,13 @@ Use this dashboard to:
321270

322271
<img src={useBaseUrl('https://sumologic-app-data-v2.s3.amazonaws.com/dashboards/AzureVirtualNetwork/Azure-Virtual-Network-Denied-Traffic-Flow.png')} alt="Azure Virtual Network - Denied Traffic Flow" style={{border: '1px solid gray'}} width="800" />
323272

273+
### Azure Virtual Network alerts
274+
These alerts are metric based and will work for all Virtual Networks.
275+
276+
| Alert Name | Description | Alert Condition | Recover Condition |
277+
|:--|:--------------------------------------------------------------------------------|:----------------|:------------------|
278+
| `Azure Virtual Network - Under DDoS attack` | This alert is triggered when maximum DDoS attack count is greater than 1.0785. | Count > 1.0785 | Count < = 1.0785 |
279+
324280
## Upgrade/Downgrade the Azure Virtual Network app (optional)
325281

326282
import AppUpdate from '../../reuse/apps/app-update.md';

0 commit comments

Comments
 (0)