Skip to content

Latest commit

 

History

History
126 lines (72 loc) · 6.66 KB

UC_Configuration_GI.md

File metadata and controls

126 lines (72 loc) · 6.66 KB

Configuring a universal connector in Guardium Insights

Before you begin

Each data source type has a specific plug-in that filters and parses the events from the data source, and converts them to a standard Guardium format. The first time that you add a connector of a specific data source type, you need to upload its plug-in. On the Plugins_management.md page, refer to the "Downloads" column for the list of plug-ins available for Guardium Insights. Click the "GI" hyperlink for the plug-in you wish to download.

About this task

The universal connector configuration has a few parts, all described in this task:

  • Configuring the connection between Guardium Insights and the data source
  • Downloading the certificate (when using Filebeat input type)

Procedure

  1. Click Connections in the Settings menu.

  2. Click Add connection. The Connect to new data source page opens, with a card for each available data source type.

  3. Select the data source type. This opens a panel that aids you in initiating the connection.

    a Select data source environment: Select the environment that hosts your data source.

    b. Select connection method: Select Universal Connector.

    c. The remainder of the panel provides Additional information about the connection type that you are creating.

    d. After reading the Additional information, click Configure.

  4. Enter the details for this connection.

    a. In the Name and description page, enter this information:

      i. Name: A unique name for the connection. This name distinguishes this connection from all other Guardium Insights connections.

      ii. Description: Enter a description for the connection.

    b. Click Next.

    c. In the Build pipeline page, use the Choose input plug-in menu to select your input plug-in. Then select a filter plug-in by using the Choose a filter plug-in menu.

    d. Click Next.

    e. Follow the instructions according to the input plug-in type you selected in step c.

Filebeat input plug-in configuration

  1. In the Additional info page, enter a Data source tag: This tag uniquely identifies the incoming Filebeat stream. This tag will be added later to the Filebeat configuration so that Filebeat will tag every event with this tag. For example, specify any-mongodb in this field.

  2. Click Configure.

  3. In the Configuration notes page, click Download certificate to download the universal connector certificate authority to your local system. Copy the certificate to the data source (it will be added to the Filebeat configuration later). All data sources of any one specific type use the same certificate.

  4. Click Done.

  5. To configure the data source to communicate with Guardium Insights, follow the instructions in the last section on this page: Configuring Filebeat to forward audit logs to Guardium. Copy the hostname in the Configuration Notes to configure the host in the filebeat.yml file on your data source.

Configuring a CloudWatch input plug-in

  1. On the Additional info page, specify the details of the connection you want to create:
  • AWS Role ARN (optional) - this is used to generate temporary credentials, typically for cross-account access. See the AssumeRole API documentation for more information.

  • AWS access key ID and AWS secret access key - your AWS user account access key and the secret access key (for more information, click here). These parameters are mandatory if you are using the CloudWatch or SQS input plug-ins in Guardium Insights. Note that unlike other Guardium deployments, in Guardium Insights configuring only role_arn without access_key_id and secret_access_key is not a valid option.

  • AWS account region - for example, "us-east-1".

  • Event filter (optional) - specify the filters to apply when fetching resources. For example, for filtering an S3 event based on a bucket name: '{$ .eventSource = "s3.amazonaws.com" && $ .requestParameters.bucketName = "give bucket name"}'.

  • Account id (Mandatory) - your AWS account ID (For more information, click here).

  • Cloudwatch Log Group name - specify the log group that is created for your data instance.

    For example, "/aws/rds/instance/any_instance/any_log_group".

    NOTE: Due to the possibility of Cloudwatch reporting events multiple times for plug-ins configured for Guardium Insights, it is recommended to use SQS instead.

Configuring Filebeat to forward audit logs to Guardium

Before you begin

Add a connection using the steps in the Filebeat input plug-in configuration section. Refer to the Configuration notes page for the data source tag and host to be used in these steps.

Procedure

  1. Open the Filebeat configuration. (filebeat.yml), usually located in /etc/filebeat/filebeat.yml.

  2. Locate the tags section and enter the Data source tag. For example, tags: ["any-mongodb"].

  3. Locate output.logstash section and add an entry for Guardium Insights:

  4. # The Logstash hosts
    hosts: ["<hostname-URL>:443"]
    

    NOTE: In Guardium Insights, whenever using plug-ins that are based on Filebeat as a data shipper, the configured port should be 443. Guardium Insights will map this to an internal port

  5. Configure TLS - UC to the data source:

    1. Download the SSL certificate (UC certificate authority) from Guardium Insights and upload it to the data source server.
    2. Copy the location of the downloaded certificate and enter it as the certificate authority.
    # List of root certificates for HTTPS server verifications
    ssl.certificate_authorities: ["/etc/pki/ca-trust/GuardiumInsightsCA.pem"]
    

    Summary:

    tags: ["any-mongodb"]
    
    output.logstash:
      # The Logstash hosts
      hosts: ["<hostname-URL>:443"]
      # List of root certificates for HTTPS server verifications
      ssl.certificate_authorities: ["<path-to-UC-CA>/GuardiumInsightsCA.pem"]
    
  6. Restart Filebeat to apply these changes

    Linux: Run the command: sudo service filebeat restart

  7. Windows: Restart in the Services window