How to avoid record "SNI TLS extension was missing." on Logs Analytic workspace of Firewall?

QuyHoang 25 Reputation points
2025-09-18T08:16:48.1+00:00

On Logs Analytic workspace of Firewall, I have a lots of records with ActionReason_s as "SNI TLS extension was missing.", and these cost make the cost so high (99% of records come from this). However, the record only have SourceIP, I don't see any value on DestinationIP or Fqdn, so I have no clue to resolve this.

Do we have any solution to avoid these records on Logs Analytic workspace, so it won't be charged anymore? Or there is any way that I find the destination on these record so I can resolve it completely?

Thanks.

Azure Firewall
Azure Firewall
An Azure network security service that is used to protect Azure Virtual Network resources.
0 comments No comments
{count} votes

Answer accepted by question author
  1. Alex Burlachenko 18,485 Reputation points Volunteer Moderator
    2025-09-18T10:41:53.5733333+00:00

    hi QuyHoang,

    those logs are basically azure firewall telling u it received a https connection attempt that was missing the server name indication extension. it's like a letter with no address. the firewall can't figure out where it's supposed to go, so it drops it and logs the event.

    the problem is, the source of this traffic is likely something on your network that is making outdated or misconfigured https calls. since the sni is missing, the firewall has no destination ip or fqdn to log. that's why those fields are empty.

    to stop the logs and the cost, u need to stop the traffic at the source. here is how u can hunt it down.

    first, use the source ip from the log. track down which machine or device in your network has that ip address. it could be an old piece of software, a device, or a server making these bad requests.

    once u find the source machine, u need to figure out what application is making the calls. check its configuration. it might be trying to connect to an external service using an old tls version that doesn't support sni, or it might be badly configured.

    if u absolutely cannot find or fix the source, u can create a firewall network rule to explicitly block traffic from that source ip on port 443. this will still create a log, but it will be a shorter 'deny' log instead of the long 'sni missing' log, which might be cheaper.

    to reduce the log volume immediately, u can adjust your diagnostic settings for the firewall. instead of sending all logs to log analytics, u could send them to a storage account for cheaper long term retention. or, u could try to filter out logs with that specific actionreason before they are sent.

    hope u find that noisy device. stopping it will save u a ton of logging hassle.

    Best regards,

    Alex

    and "yes" if you would follow me at Q&A - personaly thx.
    P.S. If my answer help to you, please Accept my answer
    

    https://ctrlaltdel.blog/


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.