Skip to main content

AWS Application Load Balancer - Cloud SIEM

This section has instructions for collecting AWS Application Load Balancer log messages via AWS S3 and sending them to Sumo Logic to be ingested by Cloud SIEM.

Sumo Logic Cloud SIEM supports the default AWS Application Load Balancer log format which includes all version 2 fields. See AWS Application Load Balancer log records documentation for more details.

Step 1: Enable AWS Application Load Balancer Logs​

By default, ALB logging is not enabled in your organization's AWS account. You can find additional assistance for enabling logging in AWS Documentation.

  1. In the AWS Management Console, choose EC2 > Load Balancers.
  2. Under Access Logs, click Edit.
  3. In the Configure Access Logs dialog box, click Enable Access Logs, then choose an Interval and S3 bucket. This is the S3 bucket that will upload logs to Sumo Logic.
  4. Click Save.
  5. Ensure permission is granted for an AWS Source.

Step 2: Configure Collection​

In this step, you configure an HTTP Source to collect AWS ALB log messages. You can configure the source on an existing Hosted Collector or create a new collector. If you’re going to use an existing collector, jump to Configure an AWS S3 Source below. Otherwise, create a new collector as described in Configure a hosted collector below, and then create the HTTP Source on the collector.

Configure a hosted collector​

  1. Classic UI. In the main Sumo Logic menu, select Manage Data > Collection > Collection.
    New UI. In the top menu select Configuration, and then under Data Collection select Collection. You can also click the Go To... menu at the top of the screen and select Collection.
  2. Click Add Collector.
  3. Click Hosted Collector.
  4. The Add Hosted Collector popup appears.
    Add hosted collector
  5. Name. Provide a Name for the Collector.
  6. Description. (Optional)
  7. Category. Enter a string to tag the output collected from the source. The string that you supply will be saved in a metadata field called _sourceCategory. 
  8. Fields. 
    1. If you are planning that all the sources you add to this collector will forward log messages to Cloud SIEM, click the +Add Field link, and add a field whose name is _siemForward and value is true. This will cause the collector to forward all of the logs collected by all of the sources on the collector to Cloud SIEM.
    2. If all sources in this collector will be AWS ALB sources, add an additional field with key _parser and value /Parsers/System/AWS/AWS ALB.
note

It’s also possible to configure individual sources to forward to Cloud SIEM, as described in the following section.

Configure an AWS S3 Source​

  1. Classic UI. In the main Sumo Logic menu, select Manage Data > Collection > Collection.
    New UI. In the top menu select Configuration, and then under Data Collection select Collection. You can also click the Go To... menu at the top of the screen and select Collection. 
  2. Navigate to the Hosted Collector where you want to create the source.
  3. On the Collectors page, click Add Source next to a Hosted Collector.
  4. Select Amazon S3. 
  5. The page refreshes.
    S3 source
  6. Name. Enter a name for the source. 
  7. Description. (Optional) 
  8. S3 Region. Choose the AWS Region the S3 bucket resides in.
  9. Bucket Name. The name of your organizations S3 bucket as it appears in AWS
  10. Path Expression. The path expression of the log file(s) in S3, can contain wildcards to include multiple log files.
  11. Source Category. Enter a string to tag the output collected from the source. The string that you supply will be saved in a metadata field called _sourceCategory.
  12. Fields.
    1. If you are not forwarding all sources in the hosted collector to Cloud SIEM, click the +Add Field link, and add a field whose name is _siemForward and value is true. This will ensure all logs for this source are forwarded to Cloud SIEM.
    2. Add another field named _parser with value /Parsers/System/AWS/AWS ALB.
  13. AWS Access. For AWS Access you have two Access Method options. Select Role-based access or Key access based on the AWS authentication you are providing. Role-based access is preferred. Note that Sumo Logic access to AWS (instructions are provided above in Step 1) is a prerequisite for role-based access
    • Role-based access. Enter the Role ARN that was provided by AWS after creating the role.
      Role ARN 
    • Key access. Enter the Access Key ID and Secret Access Key. See AWS Access Key ID and AWS Secret Access Key for details.
  14. In the Advanced Options for Logs section, uncheck the Detect messages spanning multiple lines option.
  15. Click Save.

Step 3: Verify ingestion​

In this step, you verify that your logs are successfully making it into Cloud SIEM. 

  1. Classic UI. In the top menu select Configuration, and then under Incoming Data select Log Mappings.
    New UI. In the top menu select Configuration, and then under Cloud SIEM Integrations select Log Mappings. You can also click the Go To... menu at the top of the screen and select Log Mappings.
  2. On the Log Mappings page search for "AWS Application Load Balancer" and check under Record Volume.
    AWS ELB record volume
  3. For a more granular look at the incoming records, you can also search the Sumo Logic platform for AWS ALB Flow security records.
    AWS ELB search
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.