Log queries help you to fully leverage the value of the data collected in Azure Monitor Logs. Virtually any question can be answered and analysis performed as long as the supporting data has been collected, and you understand how to construct the right query.
This Add-On allows pulling data from Azure Log Analytics workspaces to Splunk. It will extract all log data based on a Azure KUSTO query and output the results in a friendly CSV/json format (Built using just Python's standard libraries).
You must provide the following parameters to create an input:
Official MS Log Analytics queries: documentation
Custom Source type added
I would like to thank Asdrúbal Ordaz Salazar, Domingo Gil, Andrés Borjas and Rolando Maulen Olave for their helpful comments and efforts towards improving this App.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.