Azure Infrastructure: Integrating Azure resource Logs with Splunk

The document provides details on how to integrate Azure Resource logs with Splunk. This integration requires multiple steps such as follows:

  • Create a Service principle for the WUIT.
  • Create Event hub namespace & Event hub.
  • Grant the necessary Event Hub permissions on the Service principle.
  • Enable logging on each of the resources that you want to collect logs on.
  • Ship the resource logs Event hub.
  • Provide the necessary Event hub credentials to WUIT for Splunk integration.

Step 1: Create a Service Principle

  • Open a ServiceNow request with WUIT to create a Service principal.
  • Once in ServiceNow, search for Service account, select New Service Account
Searching for the module
ServiceNow request page (enlarged image)

Step 2: Fill Request Form

  • After selecting the New Service Account option
  • For Request Account Type select Service Account and fill out the form as needed.
  • After filling out the form, before you checkout, ensure to enter CC0002751 as your cost center number.
  • In the ticket, please request that they email you the SecretID, TennantID & ClientID of the Service Principle.
Searching for the module
Request form page (enlarged image)

Step 3: Create Event Hub Namespace in Azure

  • Log into azure and go to the Event hub Service and create an Event Hub Namespace.
Searching for the module
Event hub namespace page (enlarged image)
  • In the namespace creation window, ensure you select the subscription in which your resources are hosted in.
  • As namespaces are restricted to resources within the same subscription.
  • After selecting the subscription, fill in the other options as needed.
  • In the advanced window, always select the latest version i.e., Version 1.2.
Searching for the module
Namespace creation page (enlarged image)
  • In the networking window, you can make it publicly or privately accessible. If you select private access, you will have to create a private endpoint.
Searching for the module
Endpoint page (enlarged image)
  • After the namespace is created, go to Entities -> Event Hubs.
  • Select the +Event Hub to create an Event hub.
  • The log will be shipped to the created event hub.
Searching for the module
EventHub page (enlarged image)

Step 4: Grant Service Principal Permissions

  • Go to the created Event hub Namespace, then go to Access Control (IAM).
  • In the add Role Assignment Window, select the Azure Event Hubs Data Receiver role and select the appropriate service principle.
Searching for the module
Service principal page (enlarged image)

Step 5: Enable logging & ship logs to Event hub

  • In azure, go to the resource, open the Monitoring Window, select Diagnostic Settings and select add Diagnostic Settings.
Searching for the module
Diagnostic page (enlarged image)
  • In the Diagnostic Setting window, select Stream to an event hub.
  • Next, enter the needed values for the subscription, Event hub namespace, event hub.
  • Next select the appropriate logs you would like to send.
Searching for the module
(enlarged image)

Step 6: Ship logs to Splunk

  • Once you successfully ship logs to the appropriate Event hub, you will need to open a ServiceNow Data Onboarding request with WUIT.
  • Click on the following wustl.service-now to create a request:
Searching for the module
(enlarged image)
  • Once the request has been created you will need to provide the following details to the WUIT Splunk team.
Searching for the module
(enlarged image)

Updated on August 12, 2025