Collect Akamai DataStream 2 logs

Supported in:

This document explains how to ingest Akamai DataStream 2 logs to Google Security Operations using Amazon S3.

Before you begin

Make sure you have the following prerequisites:

  • Google SecOps instance
  • Privileged access to Akamai Control Center(DataStream 2 configuration access)
  • Privileged access to AWS(S3, IAM)

Configure AWS S3 bucket and IAM for Google SecOps

  1. Create Amazon S3 bucketfollowing this user guide: Creating a bucket
  2. Save bucket Nameand Regionfor future reference (for example, akamai-cloud-monitor ).
  3. Create a user following this user guide: Creating an IAM user .
  4. Select the created User.
  5. Select the Security credentialstab.
  6. Click Create Access Keyin the Access Keyssection.
  7. Select Third-party serviceas the Use case.
  8. Click Next.
  9. Optional: add a description tag.
  10. Click Create access key.
  11. Click Download CSV fileto save the Access Keyand Secret Access Keyfor later use.
  12. Click Done.
  13. Select the Permissionstab.
  14. Click Add permissionsin the Permissions policiessection.
  15. Select Add permissions.
  16. Select Attach policies directly
  17. Search for and select the AmazonS3FullAccesspolicy.
  18. Click Next.
  19. Click Add permissions.

Configure the IAM policy and role for S3 uploads

  1. In the AWS console, go to IAM > Policies > Create policy > JSON tab.
  2. Enter the following policy:

      { 
      
     "Version" 
     : 
      
     "2012-10-17" 
     , 
      
     "Statement" 
     : 
      
     [ 
      
     { 
      
     "Sid" 
     : 
      
     "AllowAkamaiWriteToS3" 
     , 
      
     "Effect" 
     : 
      
     "Allow" 
     , 
      
     "Action" 
     : 
      
     [ 
     "s3:PutObject" 
     ], 
      
     "Resource" 
     : 
      
     "arn:aws:s3:::akamai-datastream-2-logs/akamai/datastream2/json/*" 
      
     } 
      
     ] 
     } 
     
    
    • Replace akamai-datastream-2-logs if you entered a different bucket name.
  3. Click Next > Create policy.

  4. Go to IAM > Users > Create user.

  5. Name the user akamai-datastream-writer .

  6. Attach the newly created policy.

  7. Create access keys for this user to use in Akamai DataStream 2 configuration.

Configure Akamai DataStream 2 to deliver logs to Amazon S3

  1. In Akamai Control Centergo to DataStream 2.
  2. Click Create a stream.
  3. Select log typeappropriate for your property (for example, Delivery, Edge DNS, GTM).
  4. In Data sets, select the fields you require. Keep defaults unless you have a specific need.
  5. Go to Delivery > Destinationand select Amazon S3.
  6. Fill the S3 destination details using the newly created bucket:
    • Bucket: akamai-datastream-2-logs
    • Folder path: akamai/datastream2/json/
    • Region: Your bucket region
    • Access key ID: The User access key created earlier
    • Secret access key: The User secret access key created earlier
  7. Set Log formatto JSON.
  8. Optional: In Delivery options, set Push frequencyto 30 seconds.
  9. Click Validate & Save > Next > Activate.

Optional: Create read-only IAM user & keys for Google SecOps

  1. Go to AWS Console > IAM > Users > Add users.
  2. Click Add users.
  3. Provide the following configuration details:
    • User: Enter secops-reader .
    • Access type: Select Access key – Programmatic access.
  4. Click Create user.
  5. Attach minimal read policy (custom): Users > secops-reader > Permissions > Add permissions > Attach policies directly > Create policy.
  6. In the JSON editor, enter the following policy:

      { 
      
     "Version" 
     : 
      
     "2012-10-17" 
     , 
      
     "Statement" 
     : 
      
     [ 
      
     { 
      
     "Effect" 
     : 
      
     "Allow" 
     , 
      
     "Action" 
     : 
      
     [ 
     "s3:GetObject" 
     ], 
      
     "Resource" 
     : 
      
     "arn:aws:s3:::akamai-datastream-2-logs/*" 
      
     }, 
      
     { 
      
     "Effect" 
     : 
      
     "Allow" 
     , 
      
     "Action" 
     : 
      
     [ 
     "s3:ListBucket" 
     ], 
      
     "Resource" 
     : 
      
     "arn:aws:s3:::akamai-datastream-2-logs" 
      
     } 
      
     ] 
     } 
     
    
  7. Set the name to secops-reader-policy .

  8. Go to Create policy > search/select > Next > Add permissions.

  9. Go to Security credentials > Access keys > Create access key.

  10. Download the CSV(these values are entered into the feed).

Configure a feed in Google SecOps to ingest Akamai DataStream 2 logs

  1. Go to SIEM Settings > Feeds.
  2. Click + Add New Feed.
  3. In the Feed namefield, enter a name for the feed (for example, Akamai DataStream 2 logs ).
  4. Select Amazon S3 V2as the Source type.
  5. Select Akamai DataStream 2as the Log type.
  6. Click Next.
  7. Specify values for the following input parameters:
    • S3 URI: s3://akamai-datastream-2-logs/akamai/datastream2/json/
    • Source deletion options: Select deletion option according to your preference.
    • Maximum File Age: Include files modified in the last number of days. Default is 180 days.
    • Access Key ID: User access key with access to the S3 bucket.
    • Secret Access Key: User secret key with access to the S3 bucket.
    • Asset namespace: The asset namespace .
    • Ingestion labels: The label applied to the events from this feed.
  8. Click Next.
  9. Review your new feed configuration in the Finalizescreen, and then click Submit.

Need more help? Get answers from Community members and Google SecOps professionals.

Create a Mobile Website
View Site in Mobile | Classic
Share by: