Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

About The Device

Amazon Route 53 is a highly available and scalable Domain Name System (DNS) web service. You can use Route 53 to perform domain registration and DNS routing. It is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications.

Device Information

 Entity

Particulars

Vendor Name

Amazon Web Services

Product Name

Route 53

Type of Device

Cloud

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log Collection Method

Data Source

AWS Route 53 DNS

  AWS_ROUTE_53

Cloud Storage - Structured /JSON

C2C

https://cloud.google.com/chronicle/docs/reference/feed-management-api#amazon_s3

Device Configuration

Adaptive MxDR supports log collection using S3 or SQS.

Prerequisite

We support two methods to ingest logs into Chronicle from AWS Route 53. The Lambda+S3+SQS method is preferred, while the Data Firehose method is secondary.

Based on our observations, Firehose generally incurs higher costs.

Method 1: Lambda+S3+SQS 

To configure logging for DNS queries

  1. Sign in to the AWS Management Console and open the Route 53 console at https://console.aws.amazon.com/route53/

  2. In the navigation pane, choose Hosted zones.

  3. Choose the hosted zone that you want to configure query logging for.

  1. Click Configure query logging.

  1. In Configure query logging, choose an existing Log group.

  1. If you receive an alert about permissions (this happens if you haven't configured query logging with the new console before), do one of the following:

  • If you have 10 resource policies already, you can't create any more. Select any of your resource policies, and select Edit . Editing will give Route 53 permissions to write logs to your log groups. Choose Save. The alert goes away and you can continue to the next step.

  • If you have never configured query logging before (or if you haven't created 10 resource policies already), you need to grant permissions to Route 53 to write logs to your CloudWatch Logs groups. Choose Grant permissions. The alert goes away and you can continue to the next step.

  1. Click Create.

Chronicle does not support logging from CloudWatch log groups. To continuously export these logs in S3 bucket, please refer below page. Please note that lambda execution has separate costing. CloudWatch Log Group to S3 Bucket Export Automation using Lambda

To configure logging for resolver queries

  1. Sign in to the AWS Management Console and open the Route 53 console at https://console.aws.amazon.com/route53/

  2. In the navigation pane, in Resolver select Query logging.

image-20240424-130601.png
  1. Select configure query logging.

image-20240424-130633.png
  1. In Configure query logging, provide name for your configuration.

image-20240424-130717.png
  1. Select Destination for query logs as S3 bucket.

image-20240424-130809.png
  1. After selecting the destination, please select VPCs to log queries for: (Resolver logs DNS queries that originate in the VPCs that you choose here.)

    • Select Add VPC.

    • Select your VPC and click Add.

image-20240424-130857.pngimage-20240424-130939.png
  1. Add tags as per your organization policy and select configure query logging.

image-20240424-131018.png

If you would like to configure SQS, please follow below steps.

Method 2: Amazon Data Firehose

Please find more details on Firehose Configuration on the below page:

Amazon Data Firehose to Chronicle: C2C-Push

Important links:

  • Please refer below page to check required IAM user and KMS Key policies for S3, SQS and KMS

IAM User and KMS Key Policies Required for AWS

  • For more details on how to get required credentials for integration parameters please refer:

Get Credentials for AWS Storage

Integration Parameters

SQS:

Parameter Display Name

Required

Description

REGION

Yes

Select the region of your S3 bucket

QUEUE NAME

Yes

The SQS queue name.

ACCOUNT NUMBER

Yes

The account number for the SQS queue and S3 bucket.

QUEUE ACCESS KEY ID

Yes

This is the 20 character ID associated with your Amazon IAM account.

QUEUE SECRET ACCESS KEY

Yes

This is the 40 character access key associated with your Amazon IAM account.

SOURCE DELETION OPTION

Yes

Whether to delete source files after they have been transferred to Chronicle. This reduces storage costs. Valid values are:

  • SOURCE_DELETION_NEVER: Never delete files from the source.

  • SOURCE_DELETION_ON_SUCCESS:Delete files and empty directories from the source after successful ingestion.

  • SOURCE_DELETION_ON_SUCCESS_FILES_ONLY:Delete files from the source after successful ingestion.

S3 BUCKET ACCESS KEY ID

No

This is the 20 character ID associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket.

S3 BUCKET SECRET ACCESS KEY

No

This is the 40 character access key associated with your Amazon IAM account. Only specify if using a different access key for the S3 bucket.

ASSET NAMESPACE

No

To assign an asset namespace to all events that are ingested from a particular feed, set the "namespace" field within details. The namespace field is a string.

Integration via Amazon Data Firehose:

Configure Amazon Data Firehose on Google Chronicle instance and copy a Endpoint URL & Secret key.

  • No labels