This is an automated archive made by the Lemmit Bot.
The original was posted on /r/azure by /u/Agitated-Standard627 on 2023-09-08 16:12:53.
Hello, fellow Azure enthusiasts! I’m excited to share with you an update on my personal open source project: Azure-Firewall-mon. This project is an alternative and opinionable way to access and inspect Azure Firewall logs, without using Log Analytics or Kusto queries. It provides a simple and intuitive interface that shows you what is happening on your firewall right now (or almost).
What’s new in this update?
In this update, I have fixed some minor bugs and added support for the structured logs that Azure Firewall provides. These logs include:
- (structured) Network rule log.
- (structured) NAT rule log.
- (structured) Application rule log.
- (structured) DNS proxy log.
- (structured) IDPS log.
- (structured) Threat Intelligence log.
You can view these logs in a tabular format. You can also search for any text in the logs using the full-text search box at the top of the page.
How to use Azure-Firewall-mon?
Azure-Firewall-mon is a single page application, written in Angular. To use it with your data, you need to perform some steps on your Azure subscription, such as creating an Event Hub, configuring diagnostic settings, and obtaining a connection string. You can find detailed instructions on how to do this on GitHub or in the super detailed blog post of Luke Murray.
How to contribute to Azure-Firewall-mon?
Azure-Firewall-mon is an open source project, and I welcome any feedback, suggestions, or contributions from the community. If you like this project, please consider giving it a star on GitHub. If you want to collaborate, you can fork the repository and submit pull requests. If you find any issues or have any ideas for improvement, you can create an issue or comment on my post.
Thank you for your interest and support! I hope you find Azure-Firewall-mon useful and fun to use! 😊