This section has instructions for configuring a pipeline for shipping logs available from Azure Blob Storage to an Event Hub, on to an Azure Function, and finally to an HTTP source on a hosted collector in Sumo Logic.
- Only General-purpose v2 (GPv2) and Blob storage accounts are supported. This integration does not support General-purpose v1 (GPv1) accounts.
- Configure your storage account in the same location as your Azure Service.
- This solution supports only log files from Blob storage that have file extensions of .csv, .json, .blob, or .log.
- You also need to have Microsoft Authorization/role Assignments/write permissions, so they should be a "User Access Administrator" or "Owner".
Watch this tutorial to learn how to collect logs from Azure Blob Storage.
- You configure the Azure service to export logs to a container in a storage account created for that purpose.
- The ARM template creates an Event Grid subscription with the storage container as publisher and the event hub (created by the Sumo-provided ARM) as subscriber. Event Grid routes block blob creation events to event hub.
- Event Hub streams the events to the TaskProducer Azure function, which creates tasks (a JSON object that specifies start and end byte, container name, blob path) and pushes those tasks to the service bus task queue.
- The TaskConsumer Azure function, which is triggered when the service bus receives a new task, reads the block blob, from start byte to stop byte, and sends that data to Sumo.
- The set up also includes failure handling mechanism. For more information about the solution strategy, see Azure Blob Storage.
Step 1. Configure Azure storage account
In this step, you configure a storage account to which you will export monitoring data for your Azure service. The storage account must be a General-purpose v2 (GPv2) storage account.
If you have a storage account with a container you want to use for this purpose, make a note of its resource group, storage account name and container name, and proceed to Step 2.
To configure an Azure storage account, do the following:
Create a new storage account General-purpose v2 (GPv2) storage account. For instructions, see Create a storage account in Azure help.
Create a container(Optional) all services in azure create containers automatically. This step is needed only when you are exporting custom logs in some container.
- In the Azure portal, navigate to the storage account you just created (in the previous step).
- Select Blobs under Blob Service.
- Select + Container.
- Enter the Name.
- Select Private for the Public Access Level.
- Click OK.
Make a note of the container name, you will need to supply it later.
Step 2. Configure an HTTP source
In this step, you configure an HTTP source to receive logs from the Azure function.
- Select a hosted collector where you want to configure the HTTP source. If desired, create a new hosted collector, as described on Configure a Hosted Collector.
- Configure an HTTP source, as described on HTTP Logs and Metrics Source. Make a note of the URL for the source, you will need it in the next step.
Step 3. Configure Azure resources using ARM template
In this step, you use a Sumo-provided Azure Resource Manager (ARM) template to create an Event Hub, three Azure functions, Service Bus Queue, and a Storage Account.
Download the blobreaderdeploy.json ARM template.note
The above template uses Consumption Plan which does not support VNet integration, you can use blobreaderdeploywithPremiumPlan.json which uses Elastic Premium plan.
Click Create a Resource, search for Template deployment in the Azure Portal, and then click Create.
On the Custom deployment blade, click Build your own template in the editor.
Copy the contents of the template and paste it into the editor window.
On the Custom deployment blade, do the following:
Create a new Resource Group (recommended) or select an existing one.
Set the values of the following parameters:
- SumoEndpointURL: URL for the HTTP source you configured in Step 2 above.
- StorageAccountName: Name of the storage account where you are storing logs from Azure Service that you configured in Step 1 above.
- StorageAccountResourceGroupName: Name of the resource group of the storage account you configured in Step 1 above.
- StorageAccountRegion: Name of the region of the storage account you configured in Step 1 above.
- Filter Prefix (Optional): If you want to filter logs from a specific container, enter the following by replacing the variable with your container name:
Resource group names should not consist of an underscore.
Go to the Review + create tab, and then click Create.
Verify that the deployment was successful by looking at Notifications at the top right corner of the Azure Portal.
(Optional) In the same window, click Go to resource group to verify that all resources were successfully created, such as shown in the following example:
Go to Storage accounts and search for sumobrlogs, then select sumobrlogs\<random-string\>.
In the Data Storage menu, do the following:
- Click Tables.
- Click + Table.
- Enter FileOffsetMap as table name and click OK.
Example: Push NSG flow logs from a Network Security Group to Azure Blob Storage
- Login to the Azure Portal.
- Click Network security groups > Select a network security group.
- Click on NSG flow logs when you see it under Monitoring, and click Create.
- Click on Select resource and choose a NSG that is present in the same region as the storage account configured in Step 1.
- Under Subscription > Storage Accounts, select the storage account configured in Step 1.
- Specify the Retention (days) and click Review + create.
- Review the configuration of the flow log and click Create.
If logs from Azure Blob Storage do not start to flow into Sumo Logic, see the Troubleshoot Azure Blob Storage Log Collection.
Ingesting from Multiple Storage Accounts (Optional)
If you want to ingest data into Sumo from multiple storage accounts, perform following tasks for each storage account separately.
The following steps assume you have noted down the resource group name, storage account name, and container name where the blobs will be ingested from.
- Step 1: Authorize App Service read from storage account - Enables the Azure functions to read from the storage account.
- Step 2: Create an Event Grid Subscription - Subscribes all blob creation events to the Event Hub created by ARM template in Step 3 above.
- Step 3. Enabling Vnet Integration(Optional)
Step 1: Authorize App Service to read from storage account
This section provides instructions on authorizing the App Service to list the Storage Account key. This enables the Azure function to read from the storage account.
To authorize the App Service to list the Storage Account key, do the following:
Go to Storage Account and click Access Control(IAM).
Click the Add + at the top of the page.
Select Add role assignment from dropdown.
In the Add role assignment window, go to Role tab and choose Storage Blob Data Reader. Click Next.
In Members tab, select Managed Identity.
In the Select Managed identities window,
- Subscription: Choose Pay as you Go.
- Managed Identity: Choose Function App.
- Select: Select SUMOBRDLQProcessor\<unique_prefix> and SUMORTaskConsumer\<unique_prefix> app services which are created by the ARM template. Click Select.
Click Review + assign
Step 2: Create an Event Grid Subscription
This section provides instructions for creating an event grid subscription, that subscribes all blob creation events to the Event Hub created by ARM template in Step 3 above.
To create an event grid subscription, do the following:
In the left pane of Azure portal click All Services, then search for and click Event Grid Subscriptions.
At the top of the Event subscriptions page, click +Event Subscription.
The Create Event Subscription dialog appears.
Specify the following values for Event Subscription Details:
- Name: Fill the event subscription name.
- Event Schema: Select Event Grid Schema.
Specify the following values for Topic Details:
Topic Type. Select Storage Accounts.
Subscription. Select Pay As You Go
Resource Group. Select the Resource Group for the Storage Account to which your Azure service will export logs, from where you want to ingest logs.
Resource. Select the Storage Account you configured, from where you want to ingest logs.note
If you don't see your configured Storage Account in the dropdown menu, make sure you met the requirements in Requirements section.
Specify the following details for Event Types:
- Uncheck the Subscribe to all event types box.
- Select Blob Created from the Define Event Types dropdown.
Specify the following details for Endpoint Types:
Endpoint Type. Select Event Hubs from the dropdown.
Endpoint. Click on Select an endpoint.
The Select Event Hub dialog appears.
Specify the following Select Event Hub parameters, then click Confirm Selection.
- Resource Group. Select the resource group you created Step 3 in which all the resources created by ARM template are present.
- Event Hub Namespace. Select SUMOBREventHubNamespace\<unique string\>.
- Event Hub. Select blobreadereventhub from the dropdown.
Specify the following Filters tab options:
- Check Enable subject filtering.
- To filter events by container name, enter the following in the Subject Begins With field, replacing
<container_name>with the name of the container from where you want to export logs.
Verify the deployment was successful by checking Notifications in the top right corner of the Azure Portal.
Step 3: Enabling VNet Integration (Optional)
Assuming you have used the modified template which uses standard/premium plan for BlobTaskConsumer and DLQTaskConsumer functions. This assumes that your storage account access is enabled for selected networks.
Create a subnet in a virtual network using the instructions in the doc. If you have multiple accounts in the same region you can skip step 2 below and use the same subnet and add it to the storage account as mentioned in step 3.
Perform below steps for both BlobTaskConsumer and DLQTaskConsumer function apps.
Go to Function App > Networking.
Under Outbound traffic, click on Vnet Integration.
Add the Vnet and subnet created in Step 1.
Also copy the outbound ip addresses you’ll need to add it in firewall configuration of your storage account.
Go to your storage account from where you want to collect logs from. Go to Networking and add the same Vnet and subnet.
Add the outbound ip addresses (copied in step 2.d) from both BlobTaskConsumer and DLQTaskConsumer functions under Firewall with each ip in a single row of Address range column.
Verify by going to the subnet. You should see Subnet delegation and service endpoints as shown in the screenshot below.
Collection testing performance numbers
|File creation time in a single storage account||Number of files||Size of each file X Number of files||Sumo Logic Incoming Bytes Rate (MB/sec)||Sumo Logic Incoming Messages Rate (loglines/sec)||Sumo Logic total time taken for full ingestion||Sumo Logic Ingestion (GB)||Sumo Logic log count|
|~3 minutes||100||100MB X 80 + 104MB X 20||Avg 40MB/sec |
|MAX 411811/sec||3.77 minutes||9.31||20,643,840|