Skip to content

A near-real-time Azure Firewall Monitor log viewer

License

Notifications You must be signed in to change notification settings

nicolgit/azure-firewall-mon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

logo

az-firewall-mon🧑‍🚒

an alternative and opinionable way to access and inspect Azure Firewall logs


azure-firewall-mon-app

We all know that Microsoft's recommended approach for analysing Azure Firewall logs is to set up a Log Analytics Workspace to collect all the data and use Kusto (KQL) queries to check the results.

Azure-Firewall-mon focuses more on providing a tool that can answer the simple question "what is happening right now?" in an alternative and hopefully practical way: the idea is to provide an approach much more like Sysinternals Process Monitor or Check Point's SmartView/SmartLog, where there is no KUSTO queries or dashboards that you need to implement first to get working. Still, all events are available as a log-stream.

The real strength of the tool is the search field available in the top toolbar. To search for an event, simply start typing and the log flow will be automatically filtered according to those parameters.

text filter

The timestamp field displays the event date in UTC or local format. You can filter the view for the last few minutes or for a specific time range.

text filter

Within this tool, only events from the last 24 hours will appear because this is the duration set on the Event Hub Namespace. A longer duration would slow down the tool and not help answer the question "what is happening right now" that az-firewall-mon aims to address.

As an alternative to full-text search, you can use the chatGPT mode: in the top search field, you can enter a request in natural language, and the system will filter the content accordingly.

Some examples of queries are as follows:

  • "Show me events from the last 15 minutes"
  • "Search project alpha"
  • "Filter rows with category containing "NetworkRule""
  • "Filter events between 12:00 and 13:00"
  • "Filter for target containing 192.168.1.1"
  • "Include only logs with protocol TCP"
  • "Show me only the deny actions"
  • "More information on source 192.168.1.1"

chatgpt

Setup a connection with your Azure Firewall

architecture

Azure-Firewall-mon is an open source, Single Page Application, written in Angular.

To use this app with YOUR data, you must perform the following steps on your Azure Subscription:

  1. Create an Azure Event Hub Namespace

  2. Create an Azure Event Hub inside the namespace, with a 1-day retention and 1 partition

  3. Create a Shared Access Policy, with Listen claim

  4. Create an Azure Map Account

  5. Create an Azure OpenAI Service

  6. Go to OpenAI Studio > Deployments > Create a new deployment using as model gpt-4-32k v0613

  7. Open the Azure Firewall instance you want to monitor, go to Monitoring > Diagnostic Settings > Add Diagnostic Settings:

    • Select all logs and "Stream to Event Hub"
    • Select the Event Hub Namespace and Hub created above
    • click SAVE

Lazy engineers can performs steps from 1 to 6 by clicking the following button Deploy to Azure :-)

Now, open https://az-firewall-mon.duckiesfarm.com/ and do the following:

  1. copy in the Event Hub Connection String field the connection string of the Shared Access Policy created above
  2. copy the corresponding Event Hub Consumer Group Name
  3. copy in the Azure Map Account Shared Key field the primary or secondary Shared Key of the Azure Map Account created above
  4. copy in the Azure OpenAi Endpoint field the enpoint URI for the OpenAI resouce created above
  5. copy in the Azure OpenAI deployment field tne name of the deployment created above
  6. copy in the Azure OpenAI access key field the primary or secondary Shared Key of the Azure OpenAI account created above
  7. click on Let's begin.

Install Azure-firewall-mon in your environment

@lukemurraynz has written a very detailed blog post on how deploy Azure-Firewall-mon in an Azure Static Web App. If you prefer this approach, have a look at his blog post https://luke.geek.nz/azure/deploy-azure-firewall-mon-to-a-static-web-app/

NOTE: environment.prod.ts must be updated with your environment information. az-firewall-mon requires an Application Insights instance to work properly.

More Information

Azure Firewall (AF) is a cloud-native and intelligent network firewall security service that provides the best of breed threat protection for your cloud workloads running in Azure. It's a fully stateful, firewall as a service with built-in high availability and unrestricted cloud scalability. It provides both east-west and north-south traffic inspection.

Azure Monitor helps you maximize the availability and performance of your applications and services. It delivers a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments.

AF (Azure-Firewall-Mon) is integrated with Azure Monitor. This means you can forward AF metrics and logs to:

  • Log Analytics Workspace
  • Azure Storage
  • Event hub

A Log Analytics workspace is a unique environment for log data from Azure Monitor and other Azure services. Each workspace has its own data repository and configuration but might combine data from multiple services.

Be mindful, that the ingest of logs into a Log Analytics workspace has some Latency, so you may see a delay with the logs displaying.

Latency refers to the time that data is created on the monitored system and the time that it comes available for analysis in Azure Monitor.

The Kusto Query Language is a tool to explore your data in a Log Analytics Workspace. The query uses schema entities that are organized in a hierarchy similar to SQL's: databases, tables, and columns.

UIs and tools that inspired Az-Firewall-mon

smart view

SysInternals process monitor

process monitor

Credits

About

A near-real-time Azure Firewall Monitor log viewer

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published