All Apps and Add-ons

How to parse Azure Windows logs?

kiran331
Builder

Hi,

We are ingesting Windows logs(WADeventlogs) from Azure using storage table and splunk add-on for Microsoft cloud services, is there a way to parse these logs similar to regular windows logs using UF and splunk add-on for windows?

sameple log from azure using storage table:

{ [-]
Channel: Security

DeploymentId: vczdf-404c-a288-1d52afdfdf8c

Description: An account was successfully logged on.

Subject:
Security ID: S-1-0-0
Account Name: -
Account Domain: -
Logon ID: 0x0

Logon Type: 3

Impersonation Level: Delegation

New Logon:
Security ID: dfdfdfdsfdfgfgfgfgsdwerer-2776
Account Name: test$
Account Domain: test1
Logon ID: 0x24BAE58F
Logon GUID: {E1B376E4-73B3-EA5Berererqq-14EF96wrer8A811A}

Process Information:
Process ID: 0x0
Process Name: -

Network Information:
Workstation Name: -
Source Network Address: 11.12.13
Source Port: 51209

Detailed Authentication Information:
Logon Process: Kerberos
Authentication Package: Kerberos
Transited Services: -
Package Name (NTLM only): -
Key Length: 0

This event is generated when a logon session is created. It is generated on the computer that was accessed.

The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

The impersonation level field indicates the extent to which a process in the logon session can impersonate.

The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
EventId: 4624

EventTickCount: 636419648181dfdfdf78

EventTickCount@odata.type: Edm.Int64

Level: 0

Opcode: 0

PartitionKey: 063641964dfdfdfwe0000

Pid: 536

PreciseTimeStamp: 2017-09-25T19:33:38.1794078Z

PreciseTimeStamp@odata.type: Edm.DateTime

ProviderGuid: {54849625-5478-4994-xcvxcvcv3E3B0328C30D}

ProviderName: Microsoft-Windows-Security-Auditing

RawXml: 4624101254400x802000000000000039417968Securitytest1S-1-0-0--0x0S-1-5-21-3fdfdfdf-3243445-erer-2323test$test30x24bae58f3KerberosKerberos-{E1B3ererer-73B3-EA5B-92DA-1trtEF968A811A}--00x0-172.16.1.4351209%%1840

Role: IaaS

RoleInstance: test1
RowIndex: 0000000137439474851

RowKey: 7crewrc-rtrt-a288-1d52rtretretc
IaaStest1_000000013743rtrt444851

TIMESTAMP: 2017-09-25T19:33:00Z

TIMESTAMP@odata.type: Edm.DateTime

Task: 12544

Tid: 252

Timestamp: 2017-09-25T19:34:26.6729272Z

odata.etag: W/"datetime'2017-09-25T19%3A34%3A26.6729272Z'"
}

0 Karma

rafamss
Contributor

Hi @kiran331,

How you wish that log appear in your Splunk? Looking at the documentation in: http://docs.splunk.com/Documentation/AddOns/released/MSCloudServices/About of this Add-On there are some kinds of datatable there and for each datatable a data schema appropriate. Beside this i found a lot of questions in https://answers.splunk.com/app/questions/3110.html that can help you, like this: https://answers.splunk.com/answers/561251/how-can-i-index-message-tracking-logs-from-office.html

I hope help you!

[ ]s
Rafael Martins

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...