...
To run this collector, there are some configurations detailed below that you need to consider.
Configuration | Details |
---|---|
Access token | The access token is required to authenticate requests to the Akamai SIEM API. |
Client secret | The client secret is required for secure authentication alongside the access token. |
Client token | The client token is necessary for identifying and authenticating API requests. |
Host | The host specifies the endpoint for the Akamai SIEM API. |
Info |
---|
Refer to the Vendor setup section to know more about these configurations. |
...
If you are migrating from v1.x to v2.x, you can find a complete guide in this article.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Data sources
This collector extracts data from the Akamai SIEM log service:
Akamai SIEM security events: Retrieves security event data using an offset to ensure seamless data collection, starting from the last message pulled.
Data Source | Description | API Endpoint | Collector Service Name | Devo Table | Available from release |
---|---|---|---|---|---|
Security events | Get security events from a determined offset. This offset specifies the last message pulled, for the first execution this value will be NULL and for successive requests will use the offset obtained in every response from the API. |
|
|
|
|
For more information on how the events are parsed, visit our page
...
Info |
---|
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details. |
Setting | Details |
---|---|
| The access token is required to authenticate requests to the Akamai SIEM API. |
| The client secret is required for secure authentication alongside the access token. |
| The client token is necessary for identifying and authenticating API requests. |
| The host specifies the endpoint for the Akamai SIEM API, typically in the format |
| The configuration ID identifies the specific set of logs or security events to retrieve. |
Info |
---|
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method. |
Accepted authentication methods
EdgeGridAuth | Details |
---|---|
| The access token is required to authenticate requests to the Akamai SIEM API. |
| The client secret is required for secure authentication alongside the access token. |
| The client token is necessary for identifying and authenticating API requests. |
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Rw ui tabs macro | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running. StructureThe following directory structure should be created for being used when running the collector:
Devo credentialsIn Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in
Editing the config.yaml file
Example:
All defined service entities will be executed by the collector. If you do not want to run any of them, just remove the entity from the Replace the placeholders with your required values following the description table below:
Download the Docker imageThe collector should be deployed as a Docker container. Download the Docker image of the collector as a .tgz file by clicking the link in the following table:
Use the following command to add the Docker image to the system:
The Docker image can be deployed on the following services: DockerExecute the following command on the root directory
Docker ComposeThe following Docker Compose file can be used to execute the Docker container. It must be created in the
To run the container using docker-compose, execute the following command from the
We use a piece of software called Collector Server to host and manage all our available collectors. If you want us to host this collector for you, get in touch with us and we will guide you through the configuration. To enable the collector for a customer:
Editing the JSON configuration
Example:
The following table outlines the parameters available for configuring the collector. Each parameter is categorized by its necessity (mandatory or optional), data type, acceptable values or formats, and a brief description.
|
...
Expand | ||
---|---|---|
| ||
Sometimes it is necessary to activate the debug mode of the collector's logging. This debug mode increases the verbosity of the log and allows you to print execution traces that are very helpful in resolving incidents or detecting bottlenecks in heavy download processes.
For more information, visit the configuration and parameterization section corresponding to the chosen deployment mode. |
Change log
Release | Released on | Release type | Details | Recommendations | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| Improvements:
Bug fixes:
|
| |||||||||||||
|
| Improvements:
Bug fixes:
|
| |||||||||||||
|
| Improvements:
|
|