API Protection connector for Microsoft Sentinel
Connects the 42Crunch API protection to Azure Log Analytics via the REST API interface
This is autogenerated content. For changes, contact the solution provider.
Connector attributes
Connector attribute | Description |
---|---|
Log Analytics table(s) | apifirewall_log_1_CL |
Data collection rules support | Not currently supported |
Supported by | 42Crunch API Protection |
Query samples
API requests that were rate-limited
apifirewall_log_1_CL
| where TimeGenerated >= ago(30d)
| where Status_d == 429
API requests generating a server error
apifirewall_log_1_CL
| where TimeGenerated >= ago(30d)
| where Status_d >= 500 and Status_d <= 599
API requests failing JWT validation
apifirewall_log_1_CL
| where TimeGenerated >= ago(30d)
| where Error_Message_s contains "missing [\"x-access-token\"]"
Vendor installation instructions
Step 1 : Read the detailed documentation
The installation process is documented in great detail in the GitHub repository Microsoft Sentinel integration. The user should consult this repository further to understand installation and debug of the integration.
Step 2: Retrieve the workspace access credentials
The first installation step is to retrieve both your Workspace ID and Primary Key from the Microsoft Sentinel platform. Copy the values shown below and save them for configuration of the API log forwarder integration.
Step 3: Install the 42Crunch protection and log forwarder
The next step is to install the 42Crunch protection and log forwarder to protect your API. Both components are availabe as containers from the 42Crunch repository. The exact installation depends on your environment, consult the 42Crunch protection documentation for full details. Two common installation scenarios are described below:
Installation via Docker Compose
The solution can be installed using a Docker compose file.
Installation via Helm charts
The solution can be installed using a Helm chart.
Step 4: Test the data ingestion
In order to test the data ingestion the user should deploy the sample httpbin application alongside the 42Crunch protection and log forwarder described in detail here.
4.1 Install the sample
The sample application can be installed locally using a Docker compose file which installs the httpbin API server, the 42Crunch API protection, and the Microsoft Sentinel log forwarder. Set the environment variables as required using the values copied from step 2.
4.2 Run the sample
Verfify the API protection is connected to the 42Crunch platform, and then exercise the API locally on the localhost at port 8080 using curl, or similar. You should see a mixture of passing and failing API calls.
4.3 Verify the data ingestion on Log Analytics
After approximately 20 minutes access the Log Analytics workspace on your Microsoft Sentinel installation, and locate the Custom Logs section verify that a apifirewall_log_1_CL table exists. Use the sample queries to examine the data.
Next steps
For more information, go to the related solution in the Azure Marketplace.