|
| 1 | +# Send your audit logs to a SIEM |
| 2 | + |
| 3 | +**Read full documentation on how to use the Dashlane CLI to send your audit logs to a SIEM, here: https://github.com/Dashlane/dashlane-audit-logs** |
| 4 | + |
| 5 | +--- |
| 6 | + |
| 7 | +This projects allows you to retrieve your Dashlane's audit log and send them in the SIEM or storage solution of your choice, using FluentBit. At the moment, we provide out of the box configurations for the following solutions: |
| 8 | + |
| 9 | +- Azure log analytics workspace |
| 10 | +- Azure blob storage |
| 11 | +- Splunk |
| 12 | +- Elasticsearch |
| 13 | + |
| 14 | +This list is not restrictive, as others destination can be used. You can find the list of supported platforms on FluentBit's website: https://docs.fluentbit.io/manual/pipeline/outputs |
| 15 | + |
| 16 | +## Prerequisites |
| 17 | + |
| 18 | +In order to manage the Dashlane audit logs of your business account, you need to generate the credentials that will be used to pull the logs. The procedure can be found here: https://dashlane.github.io/dashlane-cli/business |
| 19 | + |
| 20 | +## How does it work ? |
| 21 | + |
| 22 | +The Docker image provided leverages the Dashlane CLI tool that will pull the audit logs and send them in your SIEM of choice. By default, when running the image in a container, the logs from DAY-1 will be retrieved, and new logs will be pulled every thirty minutes. To handle the logs, we included FluentBit with this basic configuration file: |
| 23 | + |
| 24 | +``` |
| 25 | +[INPUT] |
| 26 | + Name stdin |
| 27 | + Tag dashlane |
| 28 | +
|
| 29 | +[OUTPUT] |
| 30 | + Name stdout |
| 31 | + Match * |
| 32 | + Format json_lines |
| 33 | +``` |
| 34 | + |
| 35 | +To send the logs to a new destination, you need to enrich this configuration file template and add an **OUTPUT** section such as described on the following sections. To use your custom configuration file, you need to override the **DASHLANE_CLI_FLUENTBIT_CONF** environment variable and set the path of your configuration file. The method to pass your file will depend on the plaform you use to run the image. |
| 36 | + |
| 37 | +## Accessing the logs |
| 38 | + |
| 39 | +The first step to retrieve the audits logs is to run the custom image we provide and that can be found here: https://hub.docker.com/r/dashlane/audit-logs |
| 40 | + |
| 41 | +This image can run on the platform of your choice. To make a simple test, you can deploy it with Docker by doing so: |
| 42 | + |
| 43 | +### Environment variables |
| 44 | + |
| 45 | +`DASHLANE_CLI_FLUENTBIT_CONF` |
| 46 | + |
| 47 | +- Path of the FluentBit configuration file |
| 48 | +- Default to `/opt/fluent-bit.conf` |
| 49 | + |
| 50 | +`DASHLANE_CLI_RUN_DELAY` |
| 51 | + |
| 52 | +- Delay between each log pull |
| 53 | +- Default to `60` seconds |
| 54 | + |
| 55 | +`DASHLANE_TEAM_DEVICE_KEYS` |
| 56 | + |
| 57 | +- Secret key to authenticate against Dashlane servers as the team |
| 58 | +- [Documentation to generate the credentials](https://dashlane.github.io/dashlane-cli/business) |
| 59 | + |
| 60 | +### Running in Docker |
| 61 | + |
| 62 | +``` |
| 63 | +docker pull dashlane/audit-logs |
| 64 | +docker run -e DASHLANE_TEAM_DEVICE_KEYS=XXX -it dashlane/audit-logs:latest |
| 65 | +``` |
| 66 | + |
| 67 | +Running those commands will create a simple container that pull your business every minutes and and print them on the stdout of the container. |
| 68 | + |
| 69 | +### Kubernetes |
| 70 | + |
| 71 | +A helm chart is provided by the repository to deploy the service on Kubernetes. |
| 72 | + |
| 73 | +```bash |
| 74 | +helm install dashlane-audit-logs dashlane-audit-logs/ |
| 75 | +``` |
| 76 | + |
| 77 | +Some example of configuration is provided in `example/`. |
| 78 | + |
| 79 | +## SIEM configuration |
| 80 | + |
| 81 | +### Azure Log analytics workspace |
| 82 | + |
| 83 | +To send your Dashlane audit logs on Azure in a Log Analytics Workspace, you can use the template provided in the dashlane-audit-logs repository. The template will create a container instance that will automatically pull and run the Dashlane Docker image and send the logs in a **ContainerInstanceLog_CL** table in the Log Analytics Workspace of your choice. Before deploying the template you will have to provide: |
| 84 | + |
| 85 | +- The location where you want your container to run (ex: "West Europe") |
| 86 | +- Your Dashlane credentials |
| 87 | +- Your Log Analytics Workspace ID and Shared Key |
| 88 | + |
| 89 | +> **Click on the button to start the deployment** |
| 90 | +> |
| 91 | +> [](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FDashlane%2Fdashlane-audit-logs%2Fmain%2FAzureTemplates%2FLog%20Analytics%20Workspace%2Fazuredeploy.json) |
| 92 | +
|
| 93 | +### Azure blob storage |
| 94 | + |
| 95 | +If you want to send your logs to an Azure storage account, you can use the deployment template we provide in the dashlane-audit-logs repository, which will: |
| 96 | + |
| 97 | +- Create a storage account and a file share to upload a custom FluentBit configuration file |
| 98 | +- Create a container instance running the Docker image with your custom file |
| 99 | + |
| 100 | +You will need: |
| 101 | + |
| 102 | +- Your Dashlane credentials |
| 103 | +- A custom FluentBit configuration file |
| 104 | + |
| 105 | +> **Click on the button to start the deployment** |
| 106 | +> |
| 107 | +> [](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FDashlane%2Fdashlane-audit-logs%2Fmain%2FAzureTemplates%2FBlob%20storage%2Fazuredeploy.json) |
| 108 | +
|
| 109 | +Once your container is deployed, copy the following configuration into a file called "fluent-bit.conf". |
| 110 | + |
| 111 | +``` |
| 112 | +[INPUT] |
| 113 | + Name stdin |
| 114 | + Tag dashlane |
| 115 | +
|
| 116 | +[OUTPUT] |
| 117 | + Name stdout |
| 118 | + Match * |
| 119 | + Format json_lines |
| 120 | +
|
| 121 | +[OUTPUT] |
| 122 | + name azure_blob |
| 123 | + match * |
| 124 | + account_name ${STORAGE_ACCOUNT_NAME} |
| 125 | + shared_key ${ACCESS_KEY} |
| 126 | + container_name audit-logs |
| 127 | + auto_create_container on |
| 128 | + tls on |
| 129 | + blob_type blockblob |
| 130 | +``` |
| 131 | + |
| 132 | +Then upload in the storage account you just created. In the Azure Portal, go to **Storage accounts**, select the one you just created, go to **File shares**, select **fluentbit-configuration** and upload your configuration file. |
| 133 | + |
| 134 | +> The "blob_type" configuration specifies to create a blob for every log entry on the storage account, which facilitates the logs manipulation for eventual post-processing treatment. |
| 135 | +
|
| 136 | +> The configuration provided above is meant to be working out of the box, but can be customized to suit your needs. You can refer to FluentBit's documentation to see all available options: https://docs.fluentbit.io/manual/pipeline/outputs/azure_blob |
| 137 | +
|
| 138 | +## Splunk |
| 139 | + |
| 140 | +If you want to send your logs to Splunk, you need to create a HEC (HTTP Event Collector) on your Splunk instance. As an example, we will show here how to create one on a Splunk Cloud instance. |
| 141 | + |
| 142 | +1- On the Splunk console, go to **"Settings / Data input"** and click on **Add New** in the **HTTP Event Collector** line. |
| 143 | + |
| 144 | +2- Give your collector a name and click **Next** |
| 145 | + |
| 146 | +3- In the **Input settings** tab keep the option as is and click on **Next** |
| 147 | + |
| 148 | +4- In the **Review tab**, click on **Submit**. You should see a page indicating that the collector has been created. |
| 149 | + |
| 150 | +> The token provided will be used to authenticate and send the logs to your Splunk instance. |
| 151 | +
|
| 152 | +You can make a test by running the following command: |
| 153 | + |
| 154 | +``` |
| 155 | +curl -k https://$SPLUNK_URL.com:8088/services/collector/event -H "Authorization: Splunk $SPLUNK_TOKEN" -d '{"event": "Dashlane test"}' |
| 156 | +``` |
| 157 | + |
| 158 | +If all is working you should receive the following response: |
| 159 | + |
| 160 | +``` |
| 161 | +{"text":"Success","code":0} |
| 162 | +``` |
| 163 | + |
| 164 | +Finally, to send your Dashlane logs to Splunk, you need to customize your FluentBit configuration file by adding the relevant Splunk configuration: |
| 165 | + |
| 166 | +``` |
| 167 | +[OUTPUT] |
| 168 | + Name splunk |
| 169 | + Match * |
| 170 | + Host splunk-instance.com |
| 171 | + Port 8088 |
| 172 | + TLS On |
| 173 | + splunk_token ${SPLUNK_TOKEN} |
| 174 | +``` |
| 175 | + |
| 176 | +Here, you just need to change the host parameter and indicate yours, and pass your Splunk token as an environment variable to the container. |
| 177 | +Once the data are sent, you can query them by going to the **"Apps/Search and reporting"** menu in the console and type this basic query in the search bar: |
| 178 | + |
| 179 | +``` |
| 180 | +index=* sourcetype=* |
| 181 | +``` |
| 182 | + |
| 183 | +You should now be able to access your Dashlane audit logs. |
| 184 | + |
| 185 | +## Elasticsearch |
| 186 | + |
| 187 | +Work in progress |
| 188 | + |
| 189 | +Output configuration for Elasticsearch |
| 190 | + |
| 191 | +``` |
| 192 | +[OUTPUT] |
| 193 | + Name es |
| 194 | + Match * |
| 195 | + Host host |
| 196 | + Port 443 |
| 197 | + tls on |
| 198 | + HTTP_User user |
| 199 | + HTTP_Passwd pwd |
| 200 | + Suppress_Type_Name On |
| 201 | +``` |
| 202 | + |
| 203 | +## Notes |
| 204 | + |
| 205 | +All configuration are provided as is and designed to work out of the box. If you want customize them, you can consult the FluentBit documentation: https://docs.fluentbit.io/manual/pipeline/outputs |
0 commit comments