Ingest Osquery Data into Cloud SIEM
Sumo Logic Cloud SIEM supports osquery logs sent in JSON format for the following log types:
- Schedule results in Events format
note
Batch and Snapshot formats are not natively supported.
- Process Auditing
- Anomaly Detection
- File Integrity Monitoring
To ingest osquery data into Cloud SIEM:
- Configure an HTTP Logs and Metrics source on a collector. When you configure the source, do the following:
- Select the Forward to SIEM option in the source configuration UI. This will ensure all logs for this source are forwarded to Cloud SIEM.
- Click the +Add link to add a field whose name is
_parser
with value /Parsers/System/Osquery/Osquery JSON. This ensures that the osquery logs are parsed and normalized into structured records in Cloud SIEM.
- Configure osquery to send log messages to Sumo Logic core platform. For instructions, see Logging osquery in osquery help.
- To verify that your logs are successfully making it into Cloud SIEM:
- Classic UI. In the top menu select Configuration, and then under Incoming Data select Log Mappings.
New UI. In the top menu select Configuration, and then under Cloud SIEM Integrations select Log Mappings. You can also click the Go To... menu at the top of the screen and select Log Mappings. - On the Log Mappings tab, search for osquery and check the Records columns.
- For a more granular look at the incoming records, you can also search Sumo Logic for osquery records:
_index=sec_record* and metadata_product = "osquery"
- Classic UI. In the top menu select Configuration, and then under Incoming Data select Log Mappings.