If you're unable to connect your data source to Microsoft Sentinel using any of the existing solutions available, consider creating your own data source connector.
The following table compares essential details about each method for creating custom connectors described in this article. Select the links in the table for more details about each method.
Method description
Capability
Serverless
Complexity
Codeless Connector Platform (CCP) Best for less technical audiences to create SaaS connectors using a configuration file instead of advanced development.
Supports all capabilities available with the code.
Yes
Low; simple, codeless development
Azure Monitor Agent Best for collecting files from on-premises and IaaS sources
File collection, data transformation
No
Low
Logstash Best for on-premises and IaaS sources, any source for which a plugin is available, and organizations already familiar with Logstash
Supports all capabilities of the Azure Monitor Agent
No; requires a VM or VM cluster to run
Low; supports many scenarios with plugins
Logic Apps High cost; avoid for high-volume data Best for low-volume cloud sources
Codeless programming allows for limited flexibility, without support for implementing algorithms.
If no available action already supports your requirements, creating a custom action may add complexity.
The Codeless Connector Platform (CCP) provides a configuration file that can be used by both customers and partners, and then deployed to your own workspace, or as a solution to Microsoft Sentinel's content hub.
Connectors created using the CCP are fully SaaS, without any requirements for service installations, and also include health monitoring and full support from Microsoft Sentinel.
With the Microsoft Sentinel Logstash Output plugin, you can use any Logstash input and filtering plugins, and configure Microsoft Sentinel as the output for a Logstash pipeline. Logstash has a large library of plugins that enable input from various sources, such as Event Hubs, Apache Kafka, Files, Databases, and Cloud services. Use filtering plug-ins to parse events, filter unnecessary events, obfuscate values, and more.
For examples of using Logstash as a custom connector, see:
Custom connectors to REST APIs, SQL Servers, and file systems also support retrieving data from on-premises data sources. For more information, see Install on-premises data gateway documentation.
Prepare the information you want to retrieve.
For example, use the parse JSON action to access properties in JSON content, enabling you to select those properties from the dynamic content list when you specify inputs for your Logic App.
To take advantage of the data collected with your custom connector, develop Advanced Security Information Model (ASIM) parsers to work with your connector. Using ASIM enables Microsoft Sentinel's built-in content to use your custom data and makes it easier for analysts to query the data.
If your connector method allows for it, you can implement part of the parsing as part of the connector to improve query time parsing performance:
If you've used Logstash, use the Grok filter plugin to parse your data.
If you've used an Azure function, parse your data with code.
You will still need to implement ASIM parsers, but implementing part of the parsing directly with the connector simplifies the parsing and improves performance.
Next steps
Use the data ingested into Microsoft Sentinel to secure your environment with any of the following processes:
Learn about supported data connectors, like Microsoft Defender XDR (formerly Microsoft 365 Defender), Microsoft 365 and Office 365, Microsoft Entra ID, ATP, and Defender for Cloud Apps to Microsoft Sentinel.
Learn about how Azure Monitor's custom log ingestion and data transformation features can help you get any data into Microsoft Sentinel and shape it the way you want.