Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 10 Next »

Purpose

An analyst wants to detect <adjective> behavior in <data source>.  Using the <name> Azure collector to send <type> to Devo, the analyst will find <outcome>.  As a result, the analyst will <verb> the <entity>, preventing  them from <tactic>.

Example tables

Table

Description

Authorize It

  1. In Azure Portal, search for Entra ID.

    image-20250206-182248.png
image-20250204-220025.png
  1. Click App registrations in the left menu and click the app (or Service Principal) that you are going to use.

    image-20250206-182408.png

    Register the application

  2. open Storage accounts.

image-20250204-230305.png
  1. On the Storage accounts page, select Create and name the account.

image-20250204-230445.png

image-20250204-231127.png

  1. Click “Review + Create” then “Create”

  2. After the storage account is created, select it from the list of storage accounts and click on Access keys in the left menu.

    image-20250204-231432.png
  3. Copy the connection string.

image-20250204-231536.png

Role assignment

Alternatively, users can grant the necessary permissions to the registered application to access the Event Hub without using the RootManageSharedAccessKey. Roles can be assigned in a variety of ways (e.g. inherited from the subscription group), but the following steps will show how to assign the necessary roles directly to the Storage Account.

Repeat steps 1-2 from the Connection String section to create the Storage Account.

  1. In the Storage Account, click Access control (IAM) in the left menu, click + Add, and click Add Role Assignment.

    image-20250205-211749.png

    image-20250206-181825.png

  2. Search for either the Storage Blob Data Contributor or Storage Blob Data Owner ??Storage Blob Data Reader?? role and select it and then click Next.

  3. Click + Select members and search for the event hub application, select it, click Next.

    image-20250206-193953.png
  4. Click Review + Assign.

  5. Connection string

    Users can either obtain a connection string or use Role Assignments to allow the collector to access the Event Hub.

    1. In your Azure account, search for the Event Hubs service and click on it. 

    image-20250206-195245.png

    1. Create an Event Hub resource per region (repeat the steps below for each region):

    • Click Add.

    image-20250206-195421.png

    • Fill the mandatory fields keeping in mind that the Event Hub must be in the same region as the resources that you are going to monitor
      To capture Blob or Data Lake, see How Event Hubs Capture is charged to select a tier. Otherwise, select the cheapest tier and one throughput unit. If you need more resources, they can be added later.

    image-20250206-200043.png

    • Select “Review+Create,” then “Create.”

    • The previous steps create an EventHub namespace; now go to Event Hubs, search the created one and click on it.

      image-20250206-200452.png
    • Now click on the + Event Hub button and create a new Event Hub

      image-20250206-200535.png

      Add a name.

    • One partition count is usually enough.

      Select the maximum retention time.

      image-20250206-202451.png
    • Once the Event Hub is created in the namespace, click it and select Consumer Group in the left menu. Note that a dedicated Consumer Group for Devo needs to be created if the existing consumer groups are already in use.

    • Here you will see the Event Hub consumer groups. This will be used by the collector (or other applications) for reading data from the Event Hub. Write down the Consumer group name that you will use later in the configuration file.

    2024-10-31_15-27-13-20241031-142716.png
    • Now, in the Event Hub Namespace, click on Shared access policies, search the default policy named RootManageSharedAccessKey and click it.

    • Copy and write down the primary (or secondary) connection string to be used later in the configuration file.

Role assignment

Alternatively, users can grant the necessary permissions to the registered application to access the Event Hub without using the RootManageSharedAccessKey. Roles can be assigned in a variety of ways (e.g. inherited from the subscription group), but the following steps will show how to assign the necessary roles directly to the Event Hub Namespace.

Repeat all steps except the last one from the previous section to create the Event Hub.

  1. In the Event Hub Namespace, click Access control (IAM) in the left menu, click + Add, and click Add Access Role Assignment.

image-20240523-110513.png
  1. Search for either the Azure Event Hubs Data Receiver or Azure Event Hubs Data Owner role and select it and then click Next.

image-20240523-110529.png
  1. Click + Select members and search for the previously created App registration, select it, click Next.

image-20240523-110539.png
  1. Click Review + Assign.

image-20240523-110629.png
  1. Now, search the Monitor service and click on it.

  1. Click the Diagnostic Settings option in the left area.

  2. A list of the deployed resources will be shown. Search for the resources that you want to monitor, select them, and click Add diagnostic setting.

  1. Type a name for the rule and check the required category details (logs will be sent to the cloud.azure.eh.events table, and metrics will be sent to the cloud.azure.eh.metrics table).

  1. Check Stream to an Event Hub, and select the corresponding Event hub namespace, Event hub name, and Event hub policy name.

  1. Click Save to finish the process.

Run It

In the Cloud Collector App, create an Azure Collector instance using this parameters template, replacing the values enclosed in < >.

 

Secure It

Monitor It

Create an inactivity alert to detect interruptions of transfer of data from the source to the SQS queue using the query

from TABLE 
where toktains(hostchain,"collector-") 
select split(hostchain,"-",1) as collector_id

Set the inactivity alert to keep track of the collector_id.

  • No labels