Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Table

Description

Authorize It

  1. In Azure Portal, search for Entra ID.

    image-20250206-182248.pngImage Removed

...

  1. Click App registrations in the left menu and click the app (or Service Principal) that you are going to use.

    image-20250206-182408.pngImage Removed

    Register the application

  2. open Storage accounts.

...

  1. On the Storage accounts page, select Create and name the account.

...

image-20250204-231127.pngImage Removed

  1. Click “Review + Create” then “Create”

  2. After the storage account is created, select it from the list of storage accounts and click on Access keys in the left menu.

    image-20250204-231432.pngImage Removed
  3. Copy the connection string.

...

Role assignment

Alternatively, users can grant the necessary permissions to the registered application to access the Event Hub without using the RootManageSharedAccessKey. Roles can be assigned in a variety of ways (e.g. inherited from the subscription group), but the following steps will show how to assign the necessary roles directly to the Storage Account.

Repeat steps 1-2 from the Connection String section to create the Storage Account.

In the Storage Account, click Access control (IAM) in the left menu, click + Add, and click Add Role Assignment.

...

image-20250206-181825.pngImage Removed

...

Search for either the Storage Blob Data Contributor or Storage Blob Data Owner ??Storage Blob Data Reader?? role and select it and then click Next.

...

Click + Select members and search for the event hub application, select it, click Next.

...

Click Review + Assign.

Connection string

Users can either obtain a connection string or use Role Assignments to allow the collector to access the Event Hub.

...

To perform the authorization, the Entra Security Administrator role is required.

Items required before authorizing an Event Hub:

  • Subscription containing your Azure resources.

  • Resource group containing your Azure resources.

  • Name of the region containing Azure resources. Example: East US

  • Entra directory.

If you have more than one set of these items, then authorize an Event Hub or each set.

Items created or used during the authorization process:

  1. In Azure Portal, search for Entra ID.

    image-20250206-182248.pngImage Added
  2. Click App registrations in the left menu and click new registration

    image-20250206-182408.pngImage Added
  3. Register the application

  4. Search for the Event Hubs service and click on it. 

    image-20250206-195245.png
  5. Create an Event Hub resource per region (repeat the steps below for each region):

  6. Click Add

    Click Create.

    image-20250206-195421.png
  7. Fill the mandatory fields keeping in mind that the Event Hub must be in the same region as the resources that you are going to monitor

    Select the subscription and resource group corresponding to the resources that must be monitored.

  8. Enter a name.

  9. In the Location field, select the region containing the resources that must be monitored.

  10. To capture Blob or Data Lake, see How Event Hubs Capture is charged to select a tier. Otherwise, select the cheapest tier and one throughput unit. If you need more resources, they can be added later.

    image-20250206-200043.png

  11. Select “Review+Create,” then “Create.”

  12. The previous steps create an EventHub namespace; now go

    Return to Event Hubs

    , search the created one and click on it.image-20250206-200452.pngImage Removed
  13. Now click on the + Event Hub button and create a new Event Hub

    image-20250206-200535.pngImage Removed

    Add a name.

  14. One partition count is usually enough.

    Select the maximum retention time.

    image-20250206-202451.pngImage Removed
  15. Once the Event Hub is created in the namespace, click it and select Consumer Group in the left menu. The $Default consumer group is fine. Devo recommends that the event hub only be accessed by Devo. If any other entity is accessing the event hub, then each entity must have its own consumer group and Microsoft must be paid more.

    image-20250206-211125.pngImage Removed

  16. Now, in the Event Hub Namespace, click on Shared access policies, search the default policy named RootManageSharedAccessKey and click it.

  17. Image Removed
    • Copy and write down the primary (or secondary) connection string to be used later in the configuration file.

Role assignment

Alternatively, users can grant the necessary permissions to the registered application to access the Event Hub without using the RootManageSharedAccessKey. Roles can be assigned in a variety of ways (e.g. inherited from the subscription group), but the following steps will show how to assign the necessary roles directly to the Event Hub Namespace.

Repeat all steps except the last one from the previous section to create the Event Hub.

  1. In the Event Hub Namespace, click and open the namespace created in the previous steps.

    image-20250206-200452.pngImage Added
  2. Select Access control (IAM) in the left menu, click + Add, and click Add Access Role Assignment.

    image-20250206-211925.png

...

  1. Search for

...

  1. the Azure Event Hubs Data Receiver role and select it and then click Next.

    image-20250206-212040.pngImage Modified
  2. Click

...

  1. Select members and search for the previously created App registration.

  2. Select the Application by clicking its name

...

  1. .

  2. Once the application is already listed as a selected member, click Select.

    image-20250206-214343.pngImage Modified
  3. Click Review + Assign.

  4. In the namespace, Create a shared access policy for sending data to the event hub.

    image-20250206-220211.pngImage Modified

...

  1. Search for and select the Monitor service

...

  1. .

    image-20250206-214520.pngImage Modified
  2. Click the Diagnostic Settings option in the left area.

  3. Select a resource

...

  1. image-20250206-215233.pngImage Modified

  2. Add diagnostic setting

    image-20250206-215402.pngImage Modified
  3. Name the diagnostic setting.

  4. Enable metrics and logs. The options will vary.

  5. Enable “Stream to an event hub.”

  6. Select the namespace, hub, and policy you created.

    image-20250206-223615.pngImage Modified
  7. Click Save

...

  1. .

    Image Added
  2. Open Entra.

  3. Switch to the directory.

  4. Add your Entra ID diagnostic settings. Devo recommends enabling all log options

Run It

In the Cloud Collector App, create an Azure Collector instance using this parameters template, replacing the values enclosed in < >.

...