take clause so result sets stay capped at a safe row limit.
Prerequisites
- Azure subscription with at least one Log Analytics Workspace collecting logs
- A Microsoft Entra ID (Azure AD) app registration authorized to query the workspace
- The Log Analytics Reader role granted on the workspace (or its resource group / subscription) to the app’s service principal
- Network access from the OpenSRE environment to
https://api.loganalytics.io(or the sovereign cloud equivalent) over HTTPS
Setup
Option 1: Environment variables
Add to your.env:
| Variable | Default | Description |
|---|---|---|
AZURE_LOG_ANALYTICS_WORKSPACE_ID | — | Required. Log Analytics Workspace ID (GUID) from the Azure portal |
AZURE_LOG_ANALYTICS_TOKEN | — | Required. Microsoft Entra ID OAuth2 bearer token with Data.Read on the workspace |
AZURE_LOG_ANALYTICS_ENDPOINT | https://api.loganalytics.io | Override for sovereign clouds (e.g. https://api.loganalytics.azure.us for Azure Government) |
AZURE_TENANT_ID | — | Microsoft Entra ID tenant ID (informational; useful for multi-tenant audits) |
AZURE_SUBSCRIPTION_ID | — | Azure subscription ID (informational) |
AZURE_MAX_RESULTS | 100 | Per-query row cap; OpenSRE clamps to a hard maximum of 200 |
Option 2: Persistent store
Credentials are persisted to~/.tracer/integrations.json with 0o600 permissions:
Getting credentials
1. Find the Workspace ID
- In the Azure portal, open Log Analytics workspaces and select your workspace.
- On the workspace Overview page, copy Workspace ID (a GUID).
2. Register an Azure AD application
- Open Microsoft Entra ID → App registrations → New registration.
- Give the app a name (e.g.
opensre-log-analytics) and register it as a single-tenant app. - From the app’s Overview page, copy the Application (client) ID and the Directory (tenant) ID.
- Open Certificates & secrets → New client secret, copy the secret value (it is shown only once).
3. Grant Log Analytics Reader on the workspace
- Open the Log Analytics workspace in the portal.
- Go to Access control (IAM) → Add → Add role assignment.
- Pick the Log Analytics Reader role and assign it to the service principal created above.
4. Obtain a bearer token (client credentials flow)
AZURE_LOG_ANALYTICS_TOKEN. Tokens expire (usually after 60 minutes) — see the Token rotation note in Security best practices.
Investigation tool
OpenSRE exposes one tool against an Azure Monitor workspace:query_azure_monitor_logs
POSTs a KQL query to <endpoint>/v1/workspaces/<workspace_id>/query and returns the first table flattened into row dicts.
Arguments the planner supplies:
query— KQL query text. If omitted, OpenSRE falls back toAppTraces | order by TimeGenerated desc | take <limit>.time_range_minutes— sent as thetimespan(PT<N>M); defaults to60.limit— per-query row cap; defaults to50and is clamped tomax_results(hard limit200).
| take <limit> clause to the query if one is not present, so the workspace never returns more rows than the configured cap.
Verify
azure as the source and inspect the resulting evidence.
Example KQL queries
Recent application errors:Troubleshooting
| Symptom | Fix |
|---|---|
| 401 Unauthorized | Token is missing, expired, or scoped to the wrong audience. Regenerate with scope=https://api.loganalytics.io/.default and confirm the service principal has Log Analytics Reader on the workspace. |
| 403 Forbidden | The token is valid but the principal lacks Data.Read. Re-check the role assignment on the workspace (or its parent resource group). |
| Empty result set | Either the KQL where filter excludes everything or the workspace has no data in the requested timespan. Run the same query in Logs in the portal to confirm. |
| Wrong endpoint / DNS error | Sovereign clouds use a different host (e.g. https://api.loganalytics.azure.us for US Government, https://api.loganalytics.azure.cn for China). Set AZURE_LOG_ANALYTICS_ENDPOINT accordingly. |
Missing workspace_id / Missing access_token | One or both required credentials are absent. Confirm both env vars (or both fields in the persistent store) are populated. |
Security best practices
- Use a dedicated app registration for OpenSRE — do not reuse a personal token or a broadly-scoped service principal.
- Grant only Log Analytics Reader on the workspace; OpenSRE only needs read access to query data.
- Keep the client secret out of source control — store it in
.envor in a secret manager and only export it long enough to mint a token. - Rotate the bearer token before its 60-minute expiry. Long-lived deployments should re-mint the token from the client secret on a schedule rather than pasting a static token into
.env. - The integration is read-only: OpenSRE only issues
POST /v1/workspaces/<id>/queryrequests with atake-bounded KQL string.