Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

...

WHAT IS CLOUD NATIVE?

Cloud Native services take advantage of cloud computing and are built using microservices. The use of microservices decentralizes applications, makes environments more stable and helps to limit the possibility of an application failure.

What direction are you going with your cloud? Armor can ingest logs from services within AWS, Azure or Google Cloud Platform. In AWS, Armor can ingest logs from AWS CloudTrail, VPC Flow Logs, AWS WAF, and Amazon GuardDuty. In Azure, Network Security Group and Application Gateway flow logs can be ingested.

ARMOR LOG MANAGEMENT is ready to be configured to collect logs from the services below:

amazon web service logoImage AddedAWS CloudTrail logoImage Added

amazon web service logoImage AddedAWS GuardDuty logoImage Added

amazon web service logoImage AddedAWS WAF logoImage Added

Azure LogoImage AddedAzure Event Hubs logoImage Added

Azure LogoImage AddedAzure App Gateway LogoImage Added

Table of Contents
minLevel1
maxLevel4
outlinefalse
stylenone
typelist
printablefalse

Note

To fully use this screen, you must add the following permissions to your account:

  • Read Log Management

  • Write Log Management

  • Read Log Management Plan Selection

  • Write Log Management Plan Selection

Anchor
Overview
Overview

You can use the Log & Data Management screen to:

  • View storage consumption in the Summary section

  • View the status of the logging subagent in the Agent Sources section

  • View the status and configure existing sources and add new sources in the External Sources section

    • For documentation on adding or configuring external sources, click here

  • View or change your storage plan in the Log Storage Plans section

By default, Armor collects and retains the following log types for 30 days:

CentOS/RHEL

Ubuntu/Debian

Windows

/var/log/secure

/var/log/messages

/var/log/audit.log

/var/log/yum.log

/var/log/auth.log

/var/log/syslog

System Event Log

Security Event Log

Using the Armor Management Portal (AMP)


Anchor
View

...

-Logging-Subagent-Status
View-Logging-Subagent-Status
View Logging Subagent Status

You can use these instructions to review the logging status of your virtual machines. Specifically, you can verify if your virtual machine is sending logs to Armor.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Security.

  2. Click Log & Data Management.

  3. Click Agent Sources.

Column

Description

Name

This column displays the name of the virtual machine or instance that contains the Armor agent.

You can click a specific virtual machine to access the Virtual Machines screen.

Type

This column displays if the virtual machine or instance has been converted to a log collecting device, also known as Log Relay.

Last Log Received

This column displays the date and time when Armor last received a log.

Retention Type

This column displays the length of time that Armor keeps logs.
By default, the Armor Management Portal (AMP) retains log status and details for the previous 30 days. To review logs older than 30 days for a specified instance, see Review log retention plans.

Average Size

This column displays the average size of the collected logs.

Log Status

This column displays the status of the logging subagent.

  1. Online indicates the agent has sent logs within the past hour.

  2. Warning indicates the agent in the past 24 hours has sent logs that exceeds the 7-day moving average by 10% or more.

  3. Critical indicates the agent has not sent logs within the past hour.

  4. Offline indicates the agent (or the instance) is offline.

Anchor
Review

...

-Log-Retention-Plans
Review-Log-Retention-Plans
Review Log Retention Plans

Plan name

Log retention rate

Description

Log Management Essentials

30 days

This plan collects and stores your default log types for 30 days, which you can view in AMP.

By default, users are automatically subscribed to this plan.

Note

To make sure that you do not pass the default log collection limit, Armor recommends that you review the:

  1. Daily Log Storage Usage graph in the Summary section

...

  1. Total Log Storage graph in the Retention Plan section

Compliance Professional

13 months

This plan collects and stores your default log types for 13 months at an additional cost.

Logs from the previous 30 days are visible in AMP; however, to view logs older than 30 days, you must send a support ticket.

Note

For existing virtual machines:

After you select this plan, existing virtual machines will not be automatically enrolled in this plan; you must update each virtual machine separately.

To learn more, see Upgrade log retention for existing virtual machines.

Note

For future virtual machines:

After you select this plan, new virtual machines will be automatically enrolled in this plan.

To learn more, see Upgrade log retention for new virtual machines.

Anchor
View

...

-Log-Collections-Projections
View-Log-Collections-Projections
View Log Collections Projections

...

You can use these instructions to review AMP’s prediction regarding future log collection. You can use this information to estimate log collection cost.

  1. In the Armor Management Portal (AMP), in the left-side navigation, click Security.

  2. Click Log & Data Management.

  3. Click Retention Plan.

  4. In the bottom of the screen, review the Total Log Storage graph. 

    • The dotted line indicates AMP’s prediction for your future log collections.

Info

For more information on log retention plans, see Review log retention plans.

To learn how to submit a request to Armor Support, see Create a support ticket.

Review the following requirements before submitting your log extraction request to Armor Support.

Review Requirements

Requirement Type

Description

Supported Storage Methods

s3 bucket

  1. A globally unique S3 bucket name must be provided to Armor Support

  2. Access to the S3 bucket must be provided (IAM)

    1. Access keys

  3. File type: JSON


Physical hard drive*

  1. File type: JSON

*Physical hard drive is for

...

Armor Enterprise Cloud customers only

Unsupported Storage Methods

Armor does not support the following storage methods:

  1. Azure Blobs

  2. GCP Storage

  3. CSV format (Excel)

Panel
panelIconIdatlassian-info
panelIcon:info:
bgColor#B3D4FF
Anchor
Troubleshooting
Troubleshooting
Troubleshooting

If you do not see any data in the Search section or the Sources section of the Log & Data Management screen, consider that:

  1. The selected date range does not contain any data.

  2. The virtual machine may be powered off.

  3. You do not have permission to view log data.

    1. You must have the

...

    1. ReadLogManagement permission enabled to view log data. Contact your account administrator to enable this permission. To learn how to update your permissions, see Roles and Permissions.

If you cannot add or update your plan, consider that you do not have permission to update your plans. You must have the following permissions enabled:

  1. Read Log Management Plan Selection

  2. Write Log Management Plan Selection

  3. Read LogManagement

  4. Write LogManagement

Log and Data Management Home

...

Was this helpful?

Table of Contents
maxLevel4
minLevel3

Image Removed

Image Removed

Azure App Gateway

Image Removed

Image Removed

Azure Event Hubs

Image Removed

Image Removed

AWS WAF

Image Removed

Image Removed

AWS GuardDuty

Image Removed

Image Removed

AWS CloudTrail

WHAT IS CLOUD NATIVE?

Cloud Native services take advantage of cloud computing and are built using microservices. The use of microservices decentralizes applications, makes environments more stable and helps to limit the possibility of an application failure.

What direction are you going with your cloud? Armor can ingest logs from services within AWS, Azure or Google Cloud Platform. In AWS, Armor can ingest logs from AWS CloudTrail, VPC Flow Logs, AWS WAF, and Amazon GuardDuty. In Azure, Network Security Group and Application Gateway flow logs can be ingested.

...