Skip to content

Commit d0fa1c3

Browse files
committed
Add AWS VPC Flow
1 parent d1d559f commit d0fa1c3

File tree

9 files changed

+48
-151
lines changed

9 files changed

+48
-151
lines changed

docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
22
id: auth0
3-
title: Ingest Auth0 data into Cloud SIEM
3+
title: Ingest Auth0 Data into Cloud SIEM
44
sidebar_label: Auth0
55
description: Configure an HTTP source to ingest Auth0 log messages and send them to Cloud SIEM’s Auth0 system parser.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

1010
To ingest Auth0 data into Cloud SIEM:
11-
1. [Configure a source for Auth0](/docs/integrations/saml/auth0/#configure-a-source) and do the following:
11+
1. [Configure a source for Auth0](/docs/integrations/saml/auth0/#configure-a-source) on a source. When you configure the source, do the following:
1212
1. Select the [**Forward to SIEM** option](/docs/c2c/info/#metadata-fields) in the source configuration UI.
13-
1. Click the **+Add** link to add a field whose name is `_parser` with value */Parsers/System/Auth0/Auth0*.
13+
1. Click the **+Add** link to add a field whose name is `_parser` with value `/Parsers/System/Auth0/Auth0`.
1414
1. To verify that your logs are successfully making it into Cloud SIEM:
1515
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
1616
1. On the **Log Mappings** tab search for Auth0 and check the **Records** columns.<br/><img src={useBaseUrl('img/cse/auth0-reocrd-volume.png')} alt="Record volume" style={{border: '1px solid gray'}} style={{border: '1px solid gray'}} width="800" />

docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-application-load-balancer.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
99

1010
To ingest AWS Application Load Balancer data into Cloud SIEM:
1111
1. [Enable ELB logging in AWS](/docs/send-data/hosted-collectors/amazon-aws/aws-elastic-load-balancing-source/#enable-elb-logging-in-aws).
12-
1. [Create an Amazon S3 source](/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source/#create-an-amazons3-source) on a collector and do the following:
12+
1. [Create an Amazon S3 source](/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source/#create-an-amazons3-source) on a collector. When you configure the source, do the following:
1313
1. Click the **+Add Field** link, and add a field whose name is `_siemForward` and value is *true*. This will ensure all logs for this source are forwarded to Cloud SIEM.
14-
1. Add another field named `_parser` with value */Parsers/System/AWS/AWS ALB*.
14+
1. Add another field named `_parser` with value `/Parsers/System/AWS/AWS ALB`.
1515
1. To verify that your logs are successfully making it into Cloud SIEM: 
1616
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
1717
1. On the **Log Mappings** tab search for "AWS Application Load Balancer" and check the **Records** columns.
Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
id: aws-cloudtrail
3-
title: Ingest AWS CloudTrail data into Cloud SIEM
3+
title: Ingest AWS CloudTrail Data into Cloud SIEM
44
sidebar_label: AWS CloudTrail
55
description: Configure a CloudTrail source on a source to ingest CloudTrail log messages to be parsed by Cloud SIEM's CloudTrail system parser.
66
---
@@ -12,13 +12,11 @@ Sumo Logic Cloud SIEM supports the default AWS CloudTrail log format which inclu
1212
To ingest AWS CloudTrail data into Cloud SIEM:
1313
1. Unless you’ve already done so, [Configure CloudTrail in AWS](http://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-add-a-trail-using-the-console.html).
1414
1. Before configuring collection, you need to grant Sumo Logic permission to access your AWS data. For more information, see [Grant Access to an AWS Product](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product/).
15-
1. [Configure an AWS CloudTrail Source](/docs/send-data/hosted-collectors/amazon-aws/aws-cloudtrail-source/#configure-an-aws-cloudtrail-source) on a collector and do the following:
16-
1. Click the **+Add Field** link, and add a field whose name is `_siemForward` and value is *true*. This will ensure all logs for this source are forwarded to Cloud SIEM.
17-
1. Add another field named `_parser` with value */Parsers/System/AWS/CloudTrail*.
18-
19-
To verify that your logs are successfully making it into Cloud SIEM. 
20-
21-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
22-
1. On the **Log Mappings** tab search for "CloudTrail" and check the **Records** columns.
23-
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for CloudTrail security records.<br/><img src={useBaseUrl('img/cse/cloudtrail-search.png')} alt="CloudTrail search" style={{border: '1px solid gray'}} width="400"/>
15+
1. [Configure an AWS CloudTrail source](/docs/send-data/hosted-collectors/amazon-aws/aws-cloudtrail-source/#configure-an-aws-cloudtrail-source) on a collector. When you configure the source, do the following:
16+
1. Click the **+Add Field** link, and add a field whose name is `_siemForward` and value is *true*. This will ensure all logs for this source are forwarded to Cloud SIEM.
17+
1. Add another field named `_parser` with value `/Parsers/System/AWS/CloudTrail`.
18+
1. To verify that your logs are successfully making it into Cloud SIEM. 
19+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
20+
1. On the **Log Mappings** tab search for "CloudTrail" and check the **Records** columns.
21+
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for CloudTrail security records.<br/><img src={useBaseUrl('img/cse/cloudtrail-search.png')} alt="CloudTrail search" style={{border: '1px solid gray'}} width="400"/>
2422

docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,16 @@
11
---
22
id: aws-guardduty
3-
title: Ingest AWS GuardDuty data into Cloud SIEM
3+
title: Ingest AWS GuardDuty Data into Cloud SIEM
44
sidebar_label: AWS GuardDuty
55
description: Configure an HTTP source to ingest AWS GuardDuty log messages and send them to the GuardDuty system parser.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
1. [Configure an HTTP source for GuardDuty](/docs/integrations/amazon-aws/guardduty/#step-1-configure-an-http-source) and do the following:
10+
To ingest AWS GuardDuty data into Cloud SIEM:
11+
1. [Configure an HTTP source for GuardDuty](/docs/integrations/amazon-aws/guardduty/#step-1-configure-an-http-source) on a collector. When you configure the source, do the following:
1112
1. Select the [**Forward to SIEM** option](/docs/c2c/info/#metadata-fields) in the source configuration UI.
12-
1. Click the **+Add** link to add a field whose name is `_parser` with value */Parsers/System/AWS/GuardDuty*.
13+
1. Click the **+Add** link to add a field whose name is `_parser` with value `/Parsers/System/AWS/GuardDuty`.
1314
1. [Deploy the Sumo Logic GuardDuty events processor](/docs/integrations/amazon-aws/guardduty/#step-2-deploy-sumo-guardduty-events-processor).
1415
1. To verify that your logs are successfully making it into Cloud SIEM:
1516
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
Lines changed: 12 additions & 61 deletions
Original file line numberDiff line numberDiff line change
@@ -1,69 +1,20 @@
11
---
22
id: aws-network-firewall
3-
title: AWS Network Firewall - Cloud SIEM
3+
title: Ingest AWS Network Firewall Data into Cloud SIEM
44
sidebar_label: AWS Network Firewall
55
description: Configure collection and ingestion of AWS Network Firewall log messages from an S3 bucket to be parsed by Cloud SIEM's AWS Network Firewall system parser.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
This section has instructions for collecting AWS Network Firewall log messages from AWS S3 and sending them to Sumo Logic to be ingested by Cloud SIEM.
11-
12-
## Step 1: Enable AWS Network Firewall logs
13-
14-
1. Follow AWS instructions on [firewall log delivery](https://docs.aws.amazon.com/network-firewall/latest/developerguide/firewall-logging.html) for [S3](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html).
15-
1. Before configuring collection, you need to grant Sumo Logic permission to access your AWS data. For instructions see [Grant Access to an AWS Product](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product/).  
16-
17-
## Step 2: Configure collection
18-
19-
In this step, you configure an HTTP Source to collect AWS Network Firewall messages. You can configure the source on an existing Hosted Collector or create a new collector. If you’re going to use an existing collector, jump to [Configure an AWS S3 Source](#configure-an-aws-s3-source) below. Otherwise, create a new collector as described in [Configure a hosted collector](#configure-a-hosted-collector) below, and then create the HTTP Source on the collector.
20-
21-
### Configure a Hosted Collector
22-
23-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.
24-
1. Click **Add Collector**.
25-
1. Click **Hosted Collector.**
26-
1. The **Add Hosted Collector** popup appears.<br/><img src={useBaseUrl('img/cse/add-hosted-collector.png')} alt="Add hosted collector" style={{border: '1px solid gray'}} width="600"/>
27-
1. **Name**. Provide a Name for the Collector.
28-
1. **Description**. (Optional)
29-
1. **Category**. Enter a string to tag the output collected from the source. The string that you supply will be saved in a metadata field called `_sourceCategory`
30-
1. **Fields**
31-
1. If you are planning that all the sources you add to this collector will forward log messages to Cloud SIEM, click the **+Add Field** link, and add a field whose name is `_siemForward` and value is *true*. This will cause the collector to forward all of the logs collected by all of the sources on the collector to Cloud SIEM.
32-
1. If all sources in this collector will be AWS Network Firewall sources, add an additional field with key `_parser` and value `/Parsers/System/AWS/AWS Network Firewall`.
33-
34-
:::note
35-
It’s also possible to configure individual sources to forward to Cloud SIEM, as described in the following section.
36-
:::
37-
38-
### Configure an AWS S3 Source
39-
40-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.  
41-
1. Navigate to the Hosted Collector where you want to create the source.
42-
1. On the **Collectors** page, click **Add Source** next to a Hosted Collector.
43-
1. Select Amazon S3. 
44-
1. The page refreshes.<br/><img src={useBaseUrl('img/cse/s3-source.png')} alt="S3 source" style={{border: '1px solid gray'}} width="600"/>
45-
1. **Name**. Enter a name for the source. 
46-
1. **Description**. (Optional) 
47-
1. **S3 Region**. Choose the AWS Region the S3 bucket resides in.
48-
1. **Bucket Name**. The name of your organizations S3 bucket as it appears in AWS.
49-
1. **Path Expression**. The path expression of the log file(s) in S3, can contain wildcards to include multiple log files.
50-
1. **Source Category**. Enter a string to tag the output collected from the source. The string that you supply will be saved in a metadata field called `_sourceCategory`.
51-
1. **Fields**.
52-
1. If you are not forwarding all sources in the hosted collector to Cloud SIEM, click the **+Add Field** link, and add a field whose name is `_siemForward` and value is *true*. This will ensure all logs for this source are forwarded to Cloud SIEM.
53-
1. If you are not parsing all sources in the hosted collector with the same parser, add an additional field named `_parser` with value */Parsers/System/AWS/AWS Network Firewall*.
54-
1. **AWS Access**. For AWS Access you have two Access Method options. Select **Role-based access** or **Key access** based on the AWS authentication you are providing. Role-based access is preferred. Sumo Logic access to AWS (instructions are provided above in [Step 1](#step-1-enable-aws-network-firewall-logs)) is a prerequisite for role-based access.
55-
- **Role-based access**. Enter the Role ARN that was provided by AWS after creating the role.<br/><img src={useBaseUrl('img/cse/role-arn.png')} alt="Role ARN" style={{border: '1px solid gray'}} width="600"/>
56-
- **Key access**. Enter the Access Key ID and Secret Access Key. See [AWS Access Key ID](http://docs.aws.amazon.com/STS/latest/UsingSTS/UsingTokens.html#RequestWithSTS) and [AWS Secret Access Key](https://aws.amazon.com/iam/) for details.
57-
14. In the **Advanced Options for Logs** section, uncheck the **Detect messages spanning multiple lines** option.
58-
15. Click **Save**.
59-
60-
## Step 3: Verify ingestion
61-
62-
In this step, you verify that your logs are successfully making it into Cloud SIEM. 
63-
64-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
65-
1. On the **Log Mappings** tab search for "AWS Network Firewall " and check the **Records** columns.
66-
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for AWS Network Firewall security records. <br/><img src={useBaseUrl('img/cse/AWS-network-firewall-search.png')} alt="AWS Firewall search" style={{border: '1px solid gray'}} width="600"/>
67-
68-
69-
 
10+
To ingest AWS Network Firewall data into Cloud SIEM:
11+
1. Enable AWS Network Firewall logs:
12+
1. Follow AWS instructions on [firewall log delivery](https://docs.aws.amazon.com/network-firewall/latest/developerguide/firewall-logging.html) for [S3](https://docs.aws.amazon.com/network-firewall/latest/developerguide/logging-s3.html).
13+
1. Before configuring collection, you need to grant Sumo Logic permission to access your AWS data. For instructions see [Grant Access to an AWS Product](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product/).  
14+
1. [Create an Amazon S3 source](/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source/#create-an-amazons3-source) on a collector. When you configure the source, do the following:
15+
1. Click the **+Add Field** link, and add a field whose name is `_siemForward` and value is *true*. This will ensure all logs for this source are forwarded to Cloud SIEM.
16+
1. Add another field named `_parser` with value `/Parsers/System/AWS/AWS Network Firewall`.
17+
1. To verify that your logs are successfully making it into Cloud SIEM: 
18+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**.
19+
1. On the **Log Mappings** tab search for "AWS Network Firewall " and check the **Records** columns.
20+
1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for AWS Network Firewall security records. <br/><img src={useBaseUrl('img/cse/AWS-network-firewall-search.png')} alt="AWS Firewall search" style={{border: '1px solid gray'}} width="600"/>

0 commit comments

Comments
 (0)