It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure Log Streaming to Microsoft Azure Log Analytics

  • Last updated on

To stream log data and custom metrics from your firewall to a Log Analytics workspace in Microsoft Azure, you must connect the firewall VM to your Log Analytics workspace and configure syslog streaming on the firewall to send the syslog stream to Azure Log Analytics. For streaming logs to Log Analytics using the CEF format, you must configure Microsoft OMS Security as the streaming destination. On the Azure side, the virtual machines are connected to the Log Analytics workspace. All selected log files are then streamed to Azure Log Analytics, where they can be stored, analyzed, or processed. CloudGen Firewall boxes that run outside the Azure cloud can also be connected to a Microsoft Azure Log Analytics workspace. For more information, see How to Connect non-Azure CGFs to a Microsoft Azure Log Analytics Workspace.

To stream log data from the same source to multiple destinations, you must assign these multiple destinations to that single log source in the Logdata Stream configuration.

oms.png

 

Custom VPN Metrics
  • Client-to-site VPN tunnels
  • SSL VPN clients
  • Site-to-site VPN tunnels up
  • Site-to-site VPN tunnels down
Custom System Metrics
  • Load
  • Used memory
  • Protected IPs
Custom Firewall Metrics
  • Bytes in
  • Bytes out
  • Bytes total
  • Packets in
  • Packets out
  • Packets total
  • Connections dropped
  • IPS Hits
  • Forwarding Connections new
  • Forwarding Connections total
  • Connections new
  • Connections total
  • Connections blocked
  • Connections failed

Configure log streaming to Azure Log Analytics before managing your firewall via the Control Center.

 Step 1. Create a Log Analytics Workspace

  1. Log into the Azure portal: https://portal.azure.com
  2. Go to All services and search for Log Analytics.
  3. Select Log Analytics workspaces.
    oms_01.png
  4. In the Log Analytics  workspaces blade, click Create.

    oms_02.png

  5. In the Log Analytics workspaces blade, enter the following information:
    • Subscription – Select your subscription.
    • Resource Group – Select an existing resource group, or create a new, dedicated resource group for your workspace. 
    • Name – Enter a name for the Log Analytics workspace.
    • Region – Select the geographical location where the data for your workspace will be stored.
      oms_basics.png
  6. Click Next :  Pricing tier.
  7. The Pricing  tier blade opens. Specify values for the following:
    • Pricing tier – Select the pricing tier.
      pricing_tier.png
  8. Click Review + Create.
  9. The Review + Create blade opens. Verify your settings:
    review.png
  10. Click Create.
  11. Click Refresh in the Log Analytics workspaces blade to display the new workspace.
    display_law.png

Step 2. Install the Log Analytics Template

Install the Barracuda CloudGen Firewall Log Analytics ARM template to get the default dashboards, searches, and functions. 

  • The CloudGen Firewall ARM template to create a log analytics workspace is available on GitHub.

This template installs and configures all dashboards provided by the Barracuda CloudGen Firewall in the Log Analytics workspace. The Log Analytics workspace can be associated with a resource group created in any region.

Step 3. Connect Virtual Machines to the Log Analytics Workspace

  1. In the Azure portal, go to the workspace created in Step 1.
  2. In the Connect a data source section, click Azure Virtual machine (VMs).
  3. Search for the name of the CloudGen Firewall virtual machine that you want to connect to the workspace.
  4. Click the entry of your virtual machine.
  5. Click Connect
    connect_vm.png

It may take a couple of minutes for the extension to be installed on the firewall.

law_cgf_status.png

Step 4. Enable Syslog Streaming on the Firewall VM

Enable syslog streaming on the Barracuda CloudGen Firewall.

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Syslog Streaming. 
  2. Click Lock.
  3. Set Enable Syslog Streaming to yes.
    oms_08.png
  4. Click Send Changes and Activate.

Step 5. Enable Detailed Firewall Reporting

  1. Go to Configuration Tree > Infrastructure Services > General Firewall Configuration.
  2. Click Lock.
  3. In the left menu, select Audit and Reporting.
  4. Under Log Policy, set the Activity Log Mode to Log-Pipe-Separated-Key-Value-List.
    log_pipe.png
  5. Click Send Changes and Activate.

Step 6. Configure Logdata Filters

Define profiles specifying the log file types to be transferred / streamed. Log files are classified into top level, box level, and service level log data sources.

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Syslog Streaming .
  2. In the left menu, select Logdata Filters .
  3. Click Lock.
  4. In the Filters table, click + to add a new filter. The Filters window opens.
  5. Enter a Name
  6. Click OK.
  7. In the Data Selection table, add the Top Level Logdata log files to be streamed. You can select:
    • Fatal_log
    • Firewall_Audit_Log – The firewall audit log must be enabled and configured, and Audit Delivery must be set to Syslog Proxy. For more information, see How to Enable the Firewall Audit Log Service. Alternatively, the firewall audit log can also be streamed as a part of the firewall service logs.
    • Panic_log

    oms_09.png
  8. Configure the Affected Box Logdata filters:
    1. From the Data Selector list, select which files for this category are streamed:
      • All – All box level logs are streamed.
      • None – Box level logs are not streamed.
      • Selection – Only box level log files defined in the Data Selection list are streamed.
      oms_10.png
    2. (Selection only) Click + to add custom filters to the Data Selection table.
      1. In the Log Groups table, click +.
      2. (only for Microsoft Azure Log Analytics and standard syslog streaming) From Log Groups, select the box level log files, or select Other to enter a user defined log group pattern to stream log files matching this pattern.
      3. (optional for logfile streaming using CEF) From Log Groups, select Firewall-Activity-Only and Firewall-Threat-Only.
        conf_oms_sec.png
      4. (optional) From the Log Message Filter list, select the message types from the log group that is streamed.
      5. (Selection only) In the Selected Messages Types table, click + to add message types.
      6. Click OK.
      oms_11.png
  9. Configure the Affected Service Logdata filters:
    1. From the Data Selector list, select which files for this category are streamed:
      • All – All service logs are streamed.
      • None – Service level logs are not streamed.
      • Selection – Only service level log files defined in the Data Selection list are streamed.
    2. (Selection only) Click + to add custom filters to the Data Selection table.
      1. In the Log Groups table, click +.
      2. Select the box level log files, or select Other to enter a user defined log group pattern to stream log files matching this pattern.
      3. (optional) From the Log Message Filter list, select the message types from the log group that are streamed.
      4. (Selection only) In the Selected Messages Types table, click + to add message types.
      5. Click OK.
    oms_12.png
  10. Click Send Changes and Activate .

Step 7. Configure Azure Log Analytics as the Logstream Destination

Configure the firewall to send the syslog stream to Microsoft Azure Log Analytics.

  1. Go to CONFIGURATION > Configuration Tree > Box >  Infrastructure Services > Syslog Streaming .
  2. In the left menu, select Logstream Destinations .
  3. Click Lock.
  4. In the Destinations table, click + to add a new filter. The Destinations window opens.
  5. Enter a Name
  6. Click OK.
  7. (only for Microsoft Azure Log Analytics and standard syslog streaming) From the Logstream Destination list, select Microsoft OMS.
    oms_13.png
  8. (optional for logfile streaming using CEF) From the Logstream Destination list, select Microsoft OMS Security.
    select_dest_oms_security_via_cef.png
  9. Click OK.
  10. Click Send Changes and Activate.

Data sent to Log Analytics will show up under the Syslog tag in Azure Log Analytics. Data sent to Microsoft OMS Security can be found under CommonSecurityLog, which requires Security and Audit to be enabled in the workspace (select Configure monitoring solutions and search for the solution).

Step 8. Configure the Logdata Streams to Azure Log Analytics

Combine the logdata filters and logstream destination to a logdata stream.

  1. Go to CONFIGURATION > Configuration Tree > Box > Infrastructure Services > Syslog Streaming. 
  2. In the left menu, select Logdata Streams .
  3. Click Lock. 
  4. In the Streams table, click + to add a new syslog stream. The Streams window opens.
  5. Enter a Name
  6. Click OK.   
  7. Set Active Stream to yes.  
  8. In the Log Destinations table, click + and select the logstream destination configured in Step 5.

  9. In the Log Filters table, click + and select the logdata filter configured in Step 4. Choose either OMS or OMS Security as your log destination.
    oms_14.png
  10. Click OK.
  11. Click Send Changes and Activate.

All logs covered by the logdata filter are now streamed to Microsoft Azure Log Analytics. It might take some time for logs to be displayed in the Azure Log Analytics portal.