An environment variable ‘AzureWebJobs.AuditLogForwarder.Disabled’ is expected. This environment variable is added automatically when functions are deployed with ARM templates.
Verify this environment variable exists and is set to ’true’ for Protect Service functions and is set to ‘false’ for Log Forwarder functions.
If ESA is configured with self-signed certificate, verify that Log Forwarder ‘PTY_ESA_CA_SERVER_CERT’ is correctly set to ESA CA certificate string. Refer to Certificates on ESA for details.
If ESA is configured with publicly signed certificate, ensure Log Forwarder ‘PTY_LOG_LEVEL’ is set to ‘all’ level, restart and re-test the Log Forwarder. Review the logs to see if your root CA is used. If not used, you may supply your public CA in Log forwarder configuration ‘PTY_ESA_CA_SERVER_CERT’.
During initial non-production setup, SSL verification can be disabled by setting ‘PTY_ESA_DISABLE_TLS_CERT_VERIFY’ environment variable to ‘1’ or ’true’
fail: Protect.Aggregate[0] Failed to aggregate audit logs,
1 audit logs dropped, error: Invalid URI: The format of the URI
could not be determined.
info: iap[0] Shared memory segment POLICY does not exist: The
system cannot find the file specified.
Invalid Key Vault Uri format
Ensure that environment variable KEY_VAULT_URI has correctly formatted url.
Example 1: https://<keyvaultname>.vault.azure.net/
Example 2: https://<keyvaultname>.vault.usgovcloudapi.net/
[Error] Azure-Messaging-EventHubs: An exception occurred while
publishing a batch of events for buffered producer instance with
identifier 'x' to Event Hub: audit-logs, Partition Id: '0',
Operation Id: 'x'. Error Message: 'Unauthorized access.
Protect Service function failed to send messages to Event Hub
Ensure Forwarder Function managed identity has ‘Azure Event Hubs Data Sender’ role assigned for the Event Hub resource.