Within Azure Sentinel, I have several automation rules set up that respond with various playbooks/logic apps.
I want to be notified or know how to search the logs to find all the
The closest I've gotten to this is via azurediagnostics logs but Im noticing this only captures less than 1% of the logic apps in my environment.
AzureDiagnostics
| where OperationName contains "Microsoft.Logic"
| extend OperationType = tostring(split(OperationName,'/')[2])
| extend LogicApp = tostring(split(ResourceId,'/')[8])
| extend IncidentNumber = toint(extract(@"[a-f0-9]{8}\-[a-f0-9]{4}\-[a-f0-9]{4}\-[a-f0-9]{4}\-[a-f0-9]{12}\_(\d+)", 1, correlation_clientTrackingId_s))
| summarize Resource = strcat_array(make_set(Resource),', '),
status_s = strcat_array(make_set(status_s),', ') by LogicApp, IncidentNumber, OperationType, Level