-
Notifications
You must be signed in to change notification settings - Fork 2
Single AWS Account Ingestion with SCDM
Single account monitoring is designed to use the Splunk Data Manager to send the data to Splunk Cloud. The Splunk Data Manager will provide CloudFormation templates to configure AWS-based resources to send data to Splunk Cloud.
Monitoring a single AWS account consists of two primary steps:
- Deploy the CloudFormation templates in the Single Account CloudFormation directory to enable services
- Configure Splunk Cloud to receive the data
- Configure the Splunk Data Manager to send the data to Splunk
The CloudFormation templates need to be deployed to the AWS account to enable services that you want to retrieve data from. There are 4 CloudFormation templates in the Single Account CloudFormation directory, 1 for each service that needs to be enabled.
- cloudTrail.yml: This CloudFormation template is used to enable CloudTrail logging to CloudWatch logs, and an S3 bucket that is created as part of the CloudFormation template. Some parameters can be set during the deployment of the template:
- cloudTrailLogFileValidation: Used to enable or disable CloudTrail File Validation.
- cloudTrailIncludeGlobalServiceEvents: Used to enable or disable logging of CloudTrail global service events.
- cloudTrailMultiRegionLogging: Used to enable or disable logging of CloudTrail logs from all regions. The default is
true
, which means that the CloudTrail will be created and log activity from all regions. If you want to only log from specific regions, set this tofalse
, and deploy this CloudFormation template to each region individually that you want to monitor.
- guardDuty.yml: This template is used to enable Amazon GuardDuty in an individual region. This template needs to be deployed to each region individually that will be monitored with GuardDuty.
- iamAccessAnalyzer.yml: This template enables AWS IAM Access Analyer. Like Amazon GuardDuty, AWS IAM Access Analyzer is enabled on a pre-region basis and therefore this CloudFormation template needs to be deployed to each region you want to monitor.
- scdm-s3-pull.yml: This template configures the S3 bucket, S3 bucket policy, SQS queue and SQS policy necessary to leverage Splunk Data Manager's S3 data source input. It does not configure the necessary permissions for CLoudFront to put access logs into the S3 bucket.
- securityHub.yml: This template enables AWS Security Hub. AWS Security Hub also needs to be enabled in each region you want to monitor.
The easiest way to deploy these CloudFormation templates is via the AWS CloudFormation Console.
The only configuration that needs to be done Splunk-side in this step is adding any indexes that are needed to receive the data. You may want to create an index for all of the AWS-related data (eg a single index named aws
), or split out the data by use-case (eg CloudTrail data would go to an index named aws
, but AWS RDS logs would go to an index named database
). If you're setting this up just to see what data will look like, we recommend creating an aws
index for this data.
Follow the instructions in the Data Manager documentation for onboarding data from a single account.