Syslog is one of the critical logging components for monitoring security in Kubernetes (K8S) workloads. We recently launched the ability to collect Syslog from AKS clusters using Azure Monitor – Container Insights. In this blog post, we discuss how Azure customers can use Microsoft Sentinel to ingest and analyze the Syslog data from their AKS clusters.
Syslog data can help you monitor security and health of your AKS workloads. By sending Syslog data to Sentinel, you can use its cloud native SIEM features to detect and respond to threats, investigate incidents, and create dashboards and reports for your Kubernetes workloads.
Azure Monitor – Container Insights now allows you to collect Syslog from your AKS clusters. This data is sent to a Log Analytics workspace and written to the existing Syslog table. Because the data is sent to the existing Syslog table, it works with Sentinel automatically. You just need to set a Sentinel workspace as your destination.
NOTE: We are currently working with the Sentinel team on the design of a new dedicated Syslog connector, which will make it even easier to ingest and analyze Syslog data from your AKS clusters. We will share more information about this connector soon. In the meantime, you can use the following process to get the most out of Syslog and Sentinel for your K8S workloads.
Once enabled, you can use any of the following Sentinel capabilities to analyze Syslog data.
Hope you find this useful, please reach out if you have any questions!
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.