icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Microsoft Fabric Add-On for Splunk
SHA256 checksum (microsoft-fabric-add-on-for-splunk_101.tgz) c7bfb0b01db898f16c7633e48d9c9f626024e5d4799e483b92e1dd65d8e930bb SHA256 checksum (microsoft-fabric-add-on-for-splunk_100.tgz) c7b3d61fbcba2903de787a461c22c4d1468742e67776f4ffe6bf1cd974ff5df7
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Microsoft Fabric Add-On for Splunk

Overview
Details
Microsoft Fabric Add-on for Splunk allows users to effortlessly ingest data from Splunk to Microsoft Fabric. Microsoft Fabric is an all-in-one analytics solution for enterprises that covers everything from data movement to data science, Real-Time Analytics, and business intelligence. It offers a comprehensive suite of services, including data lake, data engineering, and data integration, all in one place.

Further details on Microsoft Fabric can be found at https://learn.microsoft.com/en-us/fabric/get-started/microsoft-fabric-overview

Ingesting Data from Splunk to Microsoft Fabric using Microsoft Fabric Addon for Splunk

Microsoft Fabric Add-On for Splunk allows users to ingest logs from splunk platform using the kusto python sdk.
Learn More about Microsoft Fabric at https://learn.microsoft.com/en-us/fabric/

Details

Details on pre-requisites, configuring the add-on and viewing the data in Microsoft Fabric is covered in this section.

Background

When we add data to Splunk, the Splunk indexer processes it and stores it in a designated index (either, by default, in the main index or custom index). Searching in Splunk involves using the indexed data for the purpose of creating metrics, dashboards and alerts. This Splunk add-on triggers an action based on the alert in Splunk. We can use Alert actions to send data to Microsoft Fabric using the specified addon.

This add-on uses kusto python sdk(https://learn.microsoft.com/en-us/azure/data-explorer/kusto/api/python/kusto-python-client-library) to send log data to Microsoft Fabric. Hence, this addon supports queued mode of ingestion by default. This addon has a durable feature as well which helps to minimize data loss during any unexpected network error scenarios. But durability in ingestion comes at the cost of throughput, so it is advised to use this option judiciously.

Prerequisites

  1. A Splunk instance (latest release) with the required installation privileges to configure add-ons.
  2. Azure Service Principal such as (clientId, clientSecret and TenantId).

Step 1: Install the Microsoft Fabric Addon

  1. Download the Microsoft Fabric Addon from the Splunkbase website
  2. Log in to your Splunk instance as an administrator.
  3. Navigate to "Apps" and click on "Manage Apps."
  4. Click on "Install app from file" and select the downloaded Microsoft Fabric for Splunk file.
  5. Follow the prompts to complete the installation

After installation of the Splunk Addon for alerts, it should be visible in the Dashboard -> Alert Actions

Step 2: Create Splunk Index

  1. Log in to your Splunk instance.
  2. Navigate to "Settings" and click on "Indexes."
  3. Click on "New Index" to create a new index.
  4. Provide a name for the index and configure the necessary settings (e.g., retention period, data model, etc.).
  5. Save the index configuration.

Step 3: Create Real Time Analytics KQL Database in Microsoft Fabric

  1. Login to Microsoft Fabric, navigate to Synapse Real Time Analytics.
  2. Click on KQL Database and create database.
  3. The created database opens up and we need to create a KQL table for ingestion.

Step 4: Configure Splunk Addon for Microsoft Fabric

  1. In Splunk dashboard, Enter your search query in the Search bar based on which alerts will be generated and this alert data will be ingested to Microsoft Fabric.
  2. Click on Save As and select Alert.
  3. Provide a name for the alert and provide the interval at which the alert should be triggered.
  4. Select the alert action as "Send to Microsoft Fabric"
  5. Configure the Azure Data Explorer connection details such as application client Id, application client secret, cluster name, database name, table name.
  6. When the alert is created, it should be visible in Splunk Dashboard -> Alerts

Step 5: Verify the data in Microsoft Fabric

  1. Once the alert is triggered in Splunk, the data will be ingested to Microsoft Fabric.
  2. Start monitoring the addon logs in Splunk by navigating to Settings -> Alert Actions -> View log events.
  3. Verify the data in Microsoft Fabric using the database and table name in the previous step.

Azure Data Explorer Addon Parameters

The following is the list of parameters which need to be entered/selected while configuring the addon
1. Microsoft Fabric Cluster Ingestion URL: Represents the ingestion URL of the Microsoft Fabric KQL cluster.
2. Azure Application Client Id: Represents the Azure Application Client Id credentials required to access Microsoft Fabric.
3. Azure Application Client secret: Represents the Azure Application Client secret credentials required to access Microsoft Fabric.
4. Azure Application Tenant Id: Represents the Azure Application Tenant Id required to access Microsoft Fabric.
5. Microsoft Fabric Database Name: This represents the name of the database created in the Microsoft Fabric KQL cluster, where we want our data to be ingested.
6. Microsoft Fabric Table Name: This represents the name of the table inside the database created in the Microsoft Fabric KQL cluster, where we want our data to be ingested.
7. Microsoft Fabric Table Mapping Name: This represents the Microsoft Fabric KQL table mapping name used to map the incoming data to created Microsoft Fabric KQL table.
8. Remove Extra Fields : This represents whether we want to remove empty fields in the splunk event payload
9. Durable Mode : This property specifies whether durability mode is required during ingestion. When set to true, the ingestion throughput is impacted.

Release Notes

Version 1.0.1
Oct. 17, 2023

fixed few compatibility errors

Version 1.0.0
Oct. 11, 2023

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.