Log queries help you to fully leverage the value of the data collected in Azure Monitor Logs. Virtually any question can be answered and analysis performed as long as the supporting data has been collected, and you understand how to construct the right query.
This Add-On allows pulling data from Azure Log Analytics workspaces to Splunk. It will extract all log data based on a Azure KUSTO query and output the results in a friendly CSV format (Built using just Python's standard libraries).
You must provide the following parameters to create an input:
Official MS Log Analytics queries: documentation
- Enabled for Splunk Cloud vetting process.
I would like to thank Asdrúbal Ordaz Salazar, Domingo Gil, Andrés Borjas and Rolando Maulen Olave for their helpful comments and efforts towards improving this App.
Developed in Python 3.7 for your convenience.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.