This guide works through deployment of Falcon Integration Gateway for Azure Log Analytics to AKS. Only the Azure backend will be enabled by this guide.
Create new API key pair at CrowdStrike Falcon. This key pair will be used to read falcon events and supplementary information from CrowdStrike Falcon.
Make sure only the following permissions are assigned to the key pair:
Sign in to the Azure portal at https://portal.azure.com/
Resource groups
.New
Review + Create
Select Create
Log Analytics workspaces
. You might have to search for it as a resource if it is not in your home menu.New
Instance details
Review + Create
Create
Assign it to your resource group. (Home > Log Analytics workspaces > Create)
In your new workspace, navigate to “Agents management” in the settings section. Here you will find your Workspace ID and Primary key. Copy both of these values and use them to set up the FIG in the next step.
Kubernetes pod specification file is readily available at https://github.com/CrowdStrike/falcon-integration-gateway.
wget https://raw.githubusercontent.com/crowdstrike/falcon-integration-gateway/main/docs/aks/falcon-integration-gateway.yaml
Replace the credentials in the pod spec with the actual Falcon and Azure credentials created in the previous steps. To following commands illustrate how to base64 encode the credentials.
echo -n $FALCON_CLIENT_ID | base64
echo -n $FALCON_CLIENT_SECRET | base64
echo -n $WORKSPACE_ID | base64
echo -n $PRIMARY_KEY | base64
Ensure your kubectl command is configured to use AKS environment
kubectl cluster-info
Deploy the pod
kubectl apply -f falcon-integration-gateway.yaml
Navigate to Azure Sentinel Logs and search for FalconDetection
.
Detail of Finding created.