Microsoft Fabric Add-On for Splunk allows users to ingest logs from splunk platform using the kusto python sdk.
Learn More about Microsoft Fabric at https://learn.microsoft.com/en-us/fabric/
Details on pre-requisites, configuring the add-on and viewing the data in Microsoft Fabric is covered in this section.
When we add data to Splunk, the Splunk indexer processes it and stores it in a designated index (either, by default, in the main index or custom index). Searching in Splunk involves using the indexed data for the purpose of creating metrics, dashboards and alerts. This Splunk add-on triggers an action based on the alert in Splunk. We can use Alert actions to send data to Microsoft Fabric using the specified addon.
This add-on uses kusto python sdk(https://learn.microsoft.com/en-us/azure/data-explorer/kusto/api/python/kusto-python-client-library) to send log data to Microsoft Fabric. Hence, this addon supports queued mode of ingestion by default. This addon has a durable feature as well which helps to minimize data loss during any unexpected network error scenarios. But durability in ingestion comes at the cost of throughput, so it is advised to use this option judiciously.
After installation of the Splunk Addon for alerts, it should be visible in the Dashboard -> Alert Actions
The following is the list of parameters which need to be entered/selected while configuring the addon
1. Microsoft Fabric Cluster Ingestion URL: Represents the ingestion URL of the Microsoft Fabric KQL cluster.
2. Azure Application Client Id: Represents the Azure Application Client Id credentials required to access Microsoft Fabric.
3. Azure Application Client secret: Represents the Azure Application Client secret credentials required to access Microsoft Fabric.
4. Azure Application Tenant Id: Represents the Azure Application Tenant Id required to access Microsoft Fabric.
5. Microsoft Fabric Database Name: This represents the name of the database created in the Microsoft Fabric KQL cluster, where we want our data to be ingested.
6. Microsoft Fabric Table Name: This represents the name of the table inside the database created in the Microsoft Fabric KQL cluster, where we want our data to be ingested.
7. Microsoft Fabric Table Mapping Name: This represents the Microsoft Fabric KQL table mapping name used to map the incoming data to created Microsoft Fabric KQL table.
8. Remove Extra Fields : This represents whether we want to remove empty fields in the splunk event payload
9. Durable Mode : This property specifies whether durability mode is required during ingestion. When set to true, the ingestion throughput is impacted.
fixed few compatibility errors
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.