data collection
235 TopicsParsing syslog
1. i am ingesting firewall logs as syslog and trying to parse out the fields accordingly using the split command, i have a problem that the beginig of the logs is not piped and i have made the split in 2 occasions. as you can see in the attached pic the FWD|UDP|p4| fields are nit parsed out. this is the _raw syslog message: Security F180 Block: FWD|UDP|p4|192.168.x,x|67|00:15:5d:0f:c4:01|255.255.255.255|68|bootpc||LAN-2-INTERNET|4017|0.0.0.0|0.0.0.0|0|1| 2. can you show me the same using normal regex i cant see in MSFT doc how to do it the old way 🙂 3. should i do the parsing on search time of the query? doesnt it increase the search time?18KViews0likes6CommentsIngesting logs from Event Hub
Hey guys, I wanted to give a try to Sentinel. But there is one thing I'd like to clarify before. Our current ingestion pipeline: we are receiving logs into Event Hubs (EH), read them by Logstash and put them into Elastic. According to this article [1] we just need to change (add) the destination as Logstash output and route logs into Log Analytics (LA). And we are good to go. This is what confuses me: EH and LA, both are located in Azure and I hoped to remove Logstash completely from the design: EH -> LA -> Sentinel. Is it possible? Did I miss something here? Or, maybe it is planned in some future? [1]: https://techcommunity.microsoft.com/t5/azure-sentinel/azure-sentinel-to-go-part1-a-lab-w-prerecorded-data-amp-a-custom/ba-p/1260191Solved11KViews0likes3CommentsParsing XML in Azure Sentinel
CliveWatson I wonder if you can give me some pointers for how to parse XML syslog information in Azure Sentinel? Here is an sample of the redacted syslog message formatted into XML 05:19.0Z Some-Server-Name Events - EventFwd [agentInfo@3401 tenantId="0" bpsId="0" tenantGUID="{00000000-0000-0000-0000-000000000000}" tenantNodePath="1\2"] �<?xml version="1.0" encoding="utf-8"?> <UpdateEvents> <MachineInfo> <AgentGUID>{00000000-0000-0000-0000-000000000000}</AgentGUID> <MachineName>Some-Machine</MachineName> <RawMACAddress>112233445566</RawMACAddress> <IPAddress>1.1.2.3</IPAddress> <AgentVersion>1.2.3.123</AgentVersion> <OSName>Windows 41</OSName> <TimeZoneBias>-10</TimeZoneBias> <UserName>myName</UserName> </MachineInfo> <BrandCommonUpdater ProductName="Brand Agent" ProductVersion="1.0.0" ProductFamily="AVP"> <UpdateEvent> <EventID>1234</EventID> <Severity>0</Severity> <GMTTime>2020-00-00T06:41:02</GMTTime> <ProductID>SomeName1999</ProductID> <Locale>0001</Locale> <Error>0</Error> <Type>SomeCore</Type> <Version>1234.0</Version> <InitiatorID>SOMEAGENT3000</InitiatorID> <InitiatorType>OnDemand</InitiatorType> <SiteName>Some-Server-Name</SiteName> <Description>N/A</Description> </UpdateEvent> </BrandCommonUpdater> </UpdateEvents> Many thanksSolved11KViews1like9CommentsAzure Activity Data Connector
Hi All, My organization is currently working to stand up Sentinel and we are implementing our data connectors. However, we are unable to enable the Azure Activity data connector. All policies are written correctly and should be sending to Sentinel, but it is saying not connected. Any recommendations?9.6KViews0likes8CommentsDisaster Recovery Design for Microsoft Sentinel
I would like to know if there is a recommended design for disaster recovery of Sentinel SIEM like placing another Log Analytic workspace in a paired region. then pointing the DR servers to report to this LAW. If in case I need a live DR then do I have to replicate the log analytic workspace to the other paired region and what is the best method to do this replication? Thanks7.8KViews0likes4CommentsSentinel Billable data
Hello can you please help me understand difference of two queries we received from vendor deployin sentinel. We have logic app running daily this query to see billable data (to monitor if we are reaching cap). Usage | where TimeGenerated > ago(1d) | where IsBillable == true | summarize BillableDataGB = sum(Quantity) / 1000. by bin(TimeGenerated, 31d), Solution | summarize TotalDataGB = sum(BillableDataGB) Also we got the visualisation in chart over mont Usage |where TimeGenerated > ago (30d) |where IsBillable == true | summarize BillableDataGB=sum(Quantity) / 1000. by bin(TimeGenerated, 1d), Solution | render columnchart However often there is big difference, while the first one reports over several days numbers 300-400, when i look at the data in second I see peaks to 700 GB. Example below. On 22June we see peak to 700GB, however the outcome of the first query was always 300-400 GB when reported 23.6. reported previous daily ingestion : 415.907715810097 GB. 22.6 reported previous daily ingestion : 367.10762928873 GB. Does not make sense to me have such big difference. ALSO WHAt Query for monnitoring and analyzing daily ingestion are you using please???7.2KViews0likes10CommentsRE: How to disconnect a data connector
Hello to all, Is there a way to disconnect a data connector? For example, if I wanted to disconnect Amazon Web Services OR Fortinet data connector (from the Microsoft Sentinel) or Azure side, what is the best approach or practice for this?7KViews0likes3CommentsCreating new field in logs based on existing one
Hello, So as the logs are ingested in Azure Sentinel, i want to add a new key/value to the logs table based on a key that already exists in the logs. For example, the new key is "Country", and if the Tenant-ID value existing in the logs is XYZ then the country should be added "United Stated". How can i add such new key and value to Azure Sentinel Schemas ? In other SIEM Solution, this is achieved by using Feeds. Thanks.Solved7KViews0likes4Comments