Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: ✏️ update cortex documentation for route53 logs #5870

Merged
merged 1 commit into from
Jul 10, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions runbooks/source/logs-to-soc-cortex-xsiam.html.md.erb
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Logs going to SOC Palo Alto Cortex Xsiam
weight: 9100
last_reviewed_on: 2024-06-18
last_reviewed_on: 2024-07-10
review_in: 6 months
---

Expand Down Expand Up @@ -31,7 +31,11 @@ We have followed Palo Alto's documentation on implementation to allow [Cortex XS
This implementation follows the same architectural pattern as pushing CloudTrail logs above. VPC flowlogs are written to a S3 bucket and triggers event notifications to an SQS queue. Cortex XSIAM then uses the references in these messages to retrieve the logs from the S3 bucket. The same IAM user access keys are used here. The terraform code for this implementation is found in the [cloud-platform-terraform-infrastructure] repository.

## 3. Route53 logs
To be implemented
### Architecture
We have followed Palo Alto's documentation on implementation to allow [Cortex XSIAM to injest Route53 from S3].

Since Route53 [Resolver query logging](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resolver-query-logs.html) is VPC bound, we are calling the [Route53 logs module](https://github.com/ministryofjustice/cloud-platform-terraform-route53-logs) at the [VPC layer within infrastructure](https://github.com/ministryofjustice/cloud-platform-infrastructure/blob/main/terraform/aws-accounts/cloud-platform-aws/vpc/main.tf#L114) and referencing the S3 bucket for the related SQS resources in the same way we do so for VPC FlowLogs, in the [cloud-platform-terraform-infrastructure] repository.

## 4. EKS logs
To be implemented

Expand All @@ -41,6 +45,7 @@ We need put in a mechanism to periodically rotate the IAM User access keys creat

[Cortex XSIAM to injest logs from Cloudtrail]: https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Administrator-Guide/Ingest-Audit-Logs-from-AWS-Cloud-Trail
[Cortex XSIAM to injest VPC flowlogs from S3]: https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Administrator-Guide/Ingest-Network-Flow-Logs-from-Amazon-S3
[Cortex XSIAM to injest Route53 from S3]: https://docs-cortex.paloaltonetworks.com/r/Cortex-XSIAM/Cortex-XSIAM-Administrator-Guide/Ingest-Network-Route-53-Logs-from-Amazon-S3
[Epic found here]: https://github.com/ministryofjustice/cloud-platform/milestone/35
[cloud-platform-terraform-infrastructure]: https://github.com/ministryofjustice/cloud-platform-infrastructure/blob/main/terraform/aws-accounts/cloud-platform-aws/account/sqs.tf
[Suggestion and issue]: https://github.com/ministryofjustice/cloud-platform/issues/5724
Loading