To run this collector, there are some configurations detailed below that you need to consider.
Configuration | Details |
---|---|
Access token | The access token is required to authenticate requests to the Akamai SIEM API. |
Client secret | The client secret is required for secure authentication alongside the access token. |
Client token | The client token is necessary for identifying and authenticating API requests. |
Host | The host specifies the endpoint for the Akamai SIEM API. |
Refer to the Vendor setup section to know more about these configurations. |
The Akamai SIEM Collector is designed to retrieve and aggregate security event data from the Akamai platform. Using Akamai's SIEM Integration API, it enables seamless collection of security logs and events, allowing organizations to centralize this critical information in their SIEM systems. This ensures streamlined analysis and improved threat detection by providing real-time, actionable insights into security-related activities across their infrastructure.
If you are migrating from v2.x to v3.x, you can find a complete guide in this article.
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
This collector extracts data from the Akamai SIEM log service:
Akamai SIEM security events: Retrieves security event data using an offset to ensure seamless data collection, starting from the last message pulled.
Data Source | Description | API Endpoint | Collector Service Name | Devo Table | Available from release |
---|---|---|---|---|---|
Security events | Get security events from a determined offset. This offset specifies the last message pulled, for the first execution this value will be NULL and for successive requests will use the offset obtained in every response from the API. |
|
|
|
|
For more information on how the events are parsed, visit our page
This collector does not implement flattening
To configure the Akamai SIEM Collector Service, follow these steps:
Access Akamai Control Center:
Log in to your Akamai Control Center.
Assign the Manage SIEM Role:
Navigate to the Identity and Access Management section.
Ensure that the Manage SIEM user role is assigned to your account.
For detailed instructions, refer to the Role-based access controls.
Create Authentication Credentials:
In the API Credentials section, create new credentials.
Select the API service named SIEM and set the access level to READ-WRITE.
Generate and securely store the following credentials:
Client Token
Client Secret
Access Token
Detailed steps can be found in the Get started guide.
Configure the SIEM API Endpoint:
Identify the appropriate hostname for the API endpoint.
Ensure Akamai’s connector is configured to communicate with this endpoint.
Implement the EdgeGrid Authentication Scheme:
Ensure that Akamai’s connector supports the Akamai EdgeGrid authentication scheme.
Configure Akamai’s connector with the Client Token, Client Secret, and Access Token obtained earlier.
For implementation details, refer to the SIEM Integration API.
Enable SIEM Integration:
In the Akamai Control Center, navigate to the SIEM Integration section of your security configuration.
Turn on SIEM Integration and enable data collection.
Refer to the SIEM Integration Guide for detailed instructions.
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details. |
Setting | Details |
---|---|
| The access token is required to authenticate requests to the Akamai SIEM API. |
| The client secret is required for secure authentication alongside the access token. |
| The client token is necessary for identifying and authenticating API requests. |
| The host specifies the endpoint for the Akamai SIEM API, typically in the format |
| The configuration ID identifies the specific set of logs or security events to retrieve. |
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method. |
EdgeGridAuth | Details |
---|---|
| The access token is required to authenticate requests to the Akamai SIEM API. |
| The client secret is required for secure authentication alongside the access token. |
| The client token is necessary for identifying and authenticating API requests. |
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
We use a piece of software called Collector Server to host and manage all our available collectors. If you want us to host this collector for you, get in touch with us and we will guide you through the configuration. To enable the collector for a customer:
Editing the JSON configuration
Example:
The following table outlines the parameters available for configuring the collector. Each parameter is categorized by its necessity (mandatory or optional), data type, acceptable values or formats, and a brief description.
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running. StructureThe following directory structure should be created for being used when running the collector:
Devo credentialsIn Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in ![]()
Editing the config.yaml file
Example:
All defined service entities will be executed by the collector. If you do not want to run any of them, just remove the entity from the Replace the placeholders with your required values following the description table below:
Download the Docker imageThe collector should be deployed as a Docker container. Download the Docker image of the collector as a .tgz file by clicking the link in the following table:
Use the following command to add the Docker image to the system:
The Docker image can be deployed on the following services: DockerExecute the following command on the root directory
Docker ComposeThe following Docker Compose file can be used to execute the Docker container. It must be created in the
To run the container using docker-compose, execute the following command from the
|
This section is intended to explain how to proceed with specific actions for services.
Once the collector has been launched, it is important to check if the ingestion is performed in a proper way. To do so, go to the collector’s logs console. This service has the following components:
Setup outputA successful run has the following output messages for the setup module:
Puller outputA successful initial run has the following output messages for the puller module:
After a successful collector’s execution (that is, no error logs found), you will see the following log message:
|
This collector uses persistent storage to download events in an orderly fashion and avoid duplicates. In case you want to re-ingest historical data or recreate the persistence, you can restart the persistence of this collector by following these steps:
The collector will detect this change and will restart the persistence using the parameters of the configuration file or the default configuration in case it has not been provided.
|
This collector has different security layers that detect both an invalid configuration and abnormal operation. This table will help you detect and resolve the most common errors.
|
This section is intended to explain how to proceed with specific operations of this collector.
InitializationThe initialization module is in charge of setup and running the input (pulling logic) and output (delivering logic) services and validating the given configuration. A successful run has the following output messages for the initializer module:
Events delivery and Devo ingestionThe event delivery module is in charge of receiving the events from the internal queues where all events are injected by the pullers and delivering them using the selected compatible delivery method. A successful run has the following output messages for the initializer module:
Sender servicesThe Integrations Factory Collector SDK has 3 different senders services depending on the event type to delivery (
Sender statisticsEach service displays its own performance statistics that allow checking how many events have been delivered to Devo by type:
|
To check the memory usage of this collector, look for the following log records in the collector which are displayed every 5 minutes by default, always after running the memory-free process.
|
Sometimes it is necessary to activate the debug mode of the collector's logging. This debug mode increases the verbosity of the log and allows you to print execution traces that are very helpful in resolving incidents or detecting bottlenecks in heavy download processes.
For more information, visit the configuration and parameterization section corresponding to the chosen deployment mode. |
Release | Released on | Release type | Details | Recommendations |
---|---|---|---|---|
| Improvements:
Bug fixes:
|
| ||
| Improvements:
Bug fixes:
|
| ||
| Improvements:
|
|