Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.
I understand that you would like to understand the Rule Processing logic of Azure Firewall
Refer to this for more information on Rule Processing
Now, wrt your specific scenario,
- I see your Deny Group has a higher priority than the Allow Group.
- This means, as long as there is no Deny Rule inside the Deny Group for "SplunkCloud", the traffic is allowed.
- I understand you would like to know the effective Allow/Deny for the "SplunkCloud" traffic using a KUSTO Query.
- AFAIK, it is not feasible to get the effective allow/deny for a specific destination without actual traffic.
- You have to test this by simulating live traffic to "SplunkCloud" and see what rules are being hit on the Firewall.
- If the Allow rule from ALLOW Group is hit, then it's safe to say no rules in the DENY Group are blocking this traffic
- However, if a different rule from DENY Group is hit, then you have to edit this rule to not deny the traffic.
- Without simulating actual live traffic, we will not be able to log a DENY/ALLOW Rule.
- So, once you start simulating traffic from a particular VM, note it's IP
- Then you can filter the Firewall Logs using the Source IP as the VM's IP
- Check if it's allowed or denied
Kindly let us know if this helps or you need further assistance on this issue.
Thanks,
Kapil
Please don’t forget to close the thread by clicking "Accept the answer" wherever the information provided helps you, as this can be beneficial to other community members.