Ingest Logs
Prerequisites
Logpoint: v7.4.0 or later
AWS Access: Read access to the Amazon S3 bucket and its objects
AWS Credentials: Valid AWS Access Key ID and Secret Access Key
Network Access: Connectivity to AWS S3 endpoints (proxy support available)
Install Cloud Trail
Download the .pak file, from the Service Desk.
Install the Package
Go to Settings >> System Settings from the navigation bar.
Click Applications.
Click Import.
Browse to the downloaded
.pakfile.Click Upload.
After installation, verify the integration appears under Settings >> System Settings >> Plugins
Configure Cloud Trail
Before configuring Cloud Trail in Logpoint, obtain AWS access credentials (Access Key ID and Secret Access Key). Go to the AWS Documentation for instructions on retrieving them.
You can configure CloudTrail using two methods:
Log Source, recommended as it provides a centralized interface for all integrations
Devices
Method 1: Configure via Log Source
For Logpoint v7.4.0:
Go to Settings >> Log Sources from the navigation bar.
Click Browse Log Source Templates and select Cloud Trail.
For Logpoint v7.5.0 and above:
Go to Settings >> Log Sources and click + Add Log Source.
Select Cloud Trail from the search bar.
Source
Configure the log source settings:
Click Source.
Enter the Log Source's Name.
Select the Fetch Interval (min) to set how frequently the logs are retrieved.
Select the Time Zone.
Connector
Configure the connection to AWS:
Click Connector.
EndPoint URL:
For Amazon S3:
https://s3.amazonaws.com(default).For third-party services: Enter the service URL.
Enter your AWS Access Key ID.
Enter your AWS Secret Access Key.
Enter the Bucket Name where CloudTrail logs are stored.
Select the AWS Region.
Routing
Set up log storage and routing:
Create Repository
Click Routing and + Create Repo.
Enter a Repo name.
In Path, specify the location to store incoming logs.
In Retention (Days), set how long logs are kept before automatic deletion.
In Availability, select the Remote logpoint and Retention (Days).
Click Create Repo.
Select the created repo in Repo.
Create Routing Criteria
Click + Add row.
Enter a Key and Value for log filtering.
Select log handling options:
Store raw message: Store both incoming and normalized logs.
Discard raw message: Keep only normalized logs.
Discard entire event: Discard both incoming and normalized logs.
Select the target Repository.
Normalization
Set up log normalization:
Click Normalization.
Either:
Select a previously created normalization policy from the dropdown, or
Select CloudTrailCompiledNormalizer from the list and click the swap icon.
Enrichment
Configure log enrichment:
Click Enrichment.
Select an Enrichment Policy.
Finalize Configuration: Click Create Log Source to save all configurations.
Method 2: Configure via Devices
Adding a Normalization Policy
Go to Settings >> Configuration >> Normalization Policies.
Click Add.
Enter a Policy Name.
Select CloudTrailCompiledNormalizer.
Click Submit.
Adding a Processing Policy
Go to Settings >> Configuration >> Processing Policies.
Click Add.
Enter a Policy Name.
Select the previously created normalization policy.
Select Enrichment Policy and Routing Policy.
Configuring the CloudTrail Log Fetcher
Go to Settings >> Configuration >> Devices.
Click the Add collectors/fetchers icon for the localhost device.
Click CloudTrail Log Fetcher.
Click Add and enter a Name.
Enter your AWS Access Key ID and Secret Access Key.
Enter the Bucket Name from which Cloud Trail fetches the logs.
Select the AWS Region.
Select the frequency at which logs are retrieved in Fetch Interval (minutes).
Select the previously created processing policy.
Select the Charset.
Filter Configuration:
Base Path: Specify the AWS directory path. Leave the field empty to fetch from all directories.
Logs From: Set the starting date for log retrieval.
Proxy Configuration (if needed):
Select Enable Proxy.
Enter proxy server IP address and Port number.
Select HTTP or HTTPS protocol.
Click Submit.
Verify Ingestion
Check Log Ingestion
Use the following query to verify CloudTrail logs are being ingested:
col_type = cloudtrail
Verify Data Flow
Check Fetcher Status: Ensure the CloudTrail fetcher is running without errors
Monitor Log Volume: Verify expected log volumes are being processed
Validate Normalization: Confirm logs are correctly parsed and normalized. Refer to the CloudTrail field mapping to understand how AWS CloudTrail logs correspond to Logpoint fields.
Test Dashboards: Access CloudTrail dashboards to verify data visualization
Last updated
Was this helpful?