Skip to main content
Sumo Logic

Configure Log Collection and Install the Amazon GuardDuty Benchmark App


This page explains the log collection process, and provides instructions for configuring log collection and installing the Amazon GuardDuty Benchmark App.

Process overview

Sumo Logic provides a SAM application based on  AWS Serverless Application Model (SAM) specification, and is published in the AWS Serverless Application Repository. This SAM deployment:

  1. Creates a Lambda function and it's associated components.
  2. Creates collector, and HTTP Source at Sumo Logic.
  3. Installs the Sumo Logic GuardDuty Benchmark App.

After completing this process, logs are ingested into Sumo Logic in the following way:

  1. Amazon GuardDuty sends notifications based on CloudWatch events when new findings, or new occurrences of existing findings, are generated.
  2. A CloudWatch events rule enables CloudWatch to send events for the GuardDuty findings to the Sumo CloudWatchEventFunction Lambda function.
  3. The Lambda function sends the events to an HTTP source on a Sumo Logic hosted collector.


Configure collection and deploy the App

This section shows you how to generate an access key and access ID for log collection, and then how to deploy the Amazon GuardDuty Bencharmark App.

Step 1: Generate an Access Key and Access ID

In this step, you need to generate access key and access ID from the Sumo Logic console.

To generate an access key and access ID, do the following:

  1. Follow the instructions as described in this Sumo Logic Access Key document.
  2. Copy down both the values as you’ll need them to deploy the Sumo Logic GuardDuty Benchmark SAM App.


Step 2: Deploy the Sumo Logic GuardDuty Benchmark SAM App

In this step, you deploy the SAM application, which creates the AWS resources described in the process overview.

To deploy the Sumo Logic GuardDuty Benchmark SAM App, do the following:

  1. Go to
  2. Search for sumologic-guardduty-benchmark and click the app link when it appears.


  1. When the page for the Sumo app appears, click Deploy.


  1. In Configure application parameters panel
  2. In Configure application parameters panel, enter the following parameters:

    1. Access ID(Required): Sumo Logic Access ID generated from Step 1.

    2. Access Key(Required): Sumo Logic Access Key generated from Step 1.

    3. Deployment Name(Required): Deployment name (environment name in lower case as per docs).

    4. Collector Name: Enter the name of the Hosted Collector which will be created in Sumo Logic.

    5. Source Name: Enter the name of the HTTP Source which will be created within the collector.

    6. Source Category Name: Enter the name of the Source Category which will be used for writing search queries.


  1. Click Deploy.
  2. When the deployment is successful, click View CloudFormation Stack.


  1. In the Outputs section, copy the app folder name to search your personal folder in the Sumo Logic console.


Sample log message



                  "asnOrg":"SK Broadband Co Ltd",
                  "isp":"SK Broadband",
                  "org":"SK Broadband"
                  "countryName":"South Korea"
   "title":"Unprotected port in EC2 Instance i-0d6c314027f74dc82 is being probed.",
   "description":"EC2 Instance i-0d6c314027f74dc82 has an unprotected port 22 which is being probed by a known malicious host with IP address"

Query sample

The following query is from the Threats by Region panel of the Amazon GuardDuty - Threat Details dashboard:

| json field=_raw "accountId", "region", "partition", "id", "arn", "type","service.serviceName","service.detectorId","service.action","severity","title","description" nodrop
| parse field=type "*:*/*" as ThreatPurpose,ResourceType,ThreatName
| json field=%service.action "networkConnectionAction.localPortDetails.port" as  localPort nodrop
| json field=%service.action "networkConnectionAction.remoteIpDetails.ipAddressV4" as ip nodrop
| parse "\"vpcId\":\"*\"" as vpcId, "\"subnetId\":\"*\"" as subnetId,"\"groupId\":\"*\"" as securityGroupId,"\"tags\":[*]" as tags,"\"groupName\":\"*\"" as securityGroupName nodrop
| if(severity=0, "Info",if(severity=2, "Low", if(severity=5, "Medium", if(severity=8, "High",if(severity=9.5, "Critical",severity))))) as severity
| timeslice 15m
| count by _timeslice, region
| transpose row _timeslice column region