Using the Azure Activity Log effectively involves accessing, filtering, analyzing, and exporting the data to meet your monitoring and auditing needs. Here’s a step-by-step guide:
Access the Activity Log
Azure Portal:
Navigate to the Azure Portal.
Open the Monitor service from the left-hand menu or search for "Monitor" in the search bar.
Select Activity Log under the Monitoring section.
Azure CLI:
Use the
az monitor activity-log
commands to fetch and filter logs.
xxxxxxxxxx
31az monitor activity-log list \
2--start-time "2024-01-01T00:00:00Z" \
3--end-time "2024-01-02T00:00:00Z"
Azure PowerShell:
Use the
Get-AzLog
cmdlet to retrieve activity log data.
xxxxxxxxxx
31Get-AzLog `
2-StartTime (Get-Date).AddDays(-1) `
3-EndTime (Get-Date)
Azure REST API:
Fetch activity logs programmatically via the Azure Monitor REST API.
Filter and Search Logs
In the Azure Portal,
Use filters at the top of the Activity Log page to narrow down results by:
Subscription: Select the Azure subscription you want to analyze.
Resource Group: Focus on logs for a specific resource group.
Event Category: Choose categories like Administrative, Policy, or Security.
Date Range: Specify the time period for logs.
Resource Type: Filter by resource type (e.g., Virtual Machines, Storage Accounts).
Operation Name: Search for specific actions (e.g., Create, Delete).
Status: Filter events by success or failure.
Analyze Logs
View Log Details: Click on any event in the Activity Log to see detailed information, including:
Operation Name: Action performed (e.g., resource deletion).
Caller: The user or service principal who performed the action.
Timestamp: When the action occurred.
Status: Success or failure.
Root Cause Analysis: Use logs to investigate issues like unexpected resource deletions or failures in deployment.
Compliance Checks: Review policy compliance or identify unauthorized changes.
Create Alerts for Activity Logs
Set up alerts to notify you of critical actions, such as resource deletions or role assignments.
Go to Monitor > Alerts > New Alert Rule.
Define the scope by selecting a subscription or resource group.
Choose Activity Log as the signal type.
Set conditions (e.g., when an operation equals "Delete").
Define actions (e.g., send an email or invoke an Azure Function).
Save and enable the alert rule.
Export Activity Logs
For long-term storage or integration with other systems:
Export to Log Analytics:
Navigate to the resource or subscription you want to monitor.
Go to Diagnostic Settings.
Add a new setting and select Send to Log Analytics.
Use KQL (Kusto Query Language) to query logs in Log Analytics.
Export to Event Hubs:
Stream logs to external systems or third-party tools for real-time processing.
Export to Storage Accounts:
Archive logs for long-term retention and compliance.
Use Advanced Tools
Log Analytics:
Query logs stored in Log Analytics using KQL for deeper insights.
xxxxxxxxxx
21AzureActivity
2| where OperationNameValue == "Microsoft.Resources/subscriptions/resourceGroups/delete"
Workbooks:
Build custom visualizations and reports for activity log data.
Azure Sentinel:
Ingest activity logs into Sentinel for security and threat analysis.
Power BI:
Export logs and visualize them for presentations and trend analysis.
Common Use Cases
Track Resource Changes: Identify who created, deleted, or modified resources.
Audit and Compliance: Ensure all actions align with governance policies.
Troubleshoot Issues: Investigate failed deployments or unauthorized actions.
Monitor Security: Detect suspicious or anomalous administrative actions.
Set Alerts: Proactively respond to critical events.
Best Practices
Regular Monitoring: Review logs periodically to ensure normal operations.
Set Alerts for Key Events: Focus on high-priority events like policy violations or resource deletions.
Export for Retention: Use export options for retaining logs beyond the default 90-day limit.
Use Dimensions for Filtering: Leverage filters like Resource Type or Operation Name for targeted queries.
Integrate with Security Tools: Feed activity logs into Azure Sentinel or third-party SIEM systems for advanced threat detection.
Troubleshooting Tips
Missing Logs: Ensure the diagnostic settings are configured properly for the resources in question.
High Costs: Optimize log exports to avoid unnecessary data ingestion.
Complex Queries: Use KQL samples from Microsoft documentation as a starting point for advanced log analysis.
Getting Started
Open Monitor > Activity Log in the Azure Portal.
Explore the built-in filtering options.
Set up alerts or diagnostic settings to automate monitoring and export.
Integrate with tools like Log Analytics, Sentinel, or Power BI for deeper insights.
Summary
Azure Activity Logs are invaluable for maintaining visibility and control over your Azure resources, helping you ensure compliance, detect issues, and maintain operational excellence.
Leave a Reply