Integrate with Datadog using a syslog forwarder and TLS
In this topic, you will learn how to send Portnox™ Cloud alerts to the Datadog SIEM solution using a syslog forwarder with TLS for increased security.
To integrate with Datadog using a syslog forwarder and TLS:
- Deploy a machine or a virtual machine as a syslog message collector.
- Install syslog-ng (or similar software) on this machine and accept syslog events via TLS from Portnox Cloud.
- Send the syslog events to the Datadog HTTPS intake API via HTTPS.
In this example configuration, we are using a virtual machine in Microsoft Azure with syslog-ng and a TLS connection. Using this configuration, the entire communications is encrypted using TLS (Portnox Cloud to syslog collector) and HTTPS (syslog collector to Datadog).
Create a Linux virtual machine
To integrate with Datadog, you need to run syslog software on a physical or virtual machine, so that it can collect alert data from Portnox™ Cloud and send that data to Datadog. In this section, you will learn how to create and configure such a virtual machine in Microsoft Azure based on the Linux Ubuntu operating system.
- Open the Azure Portal dashboard in your browser.
-
In the Azure services menu on your dashboard, click on the Create a
Resource option.
-
In the Marketplace pane, in the Search the Marketplace field, type
virtual machine and press the ↩ key. In the
Virtual machine tile below, click on the Create button and select
the Virtual machine option from the context menu.
-
In the Create a virtual machine pane, enter the details for your virtual machine and then
click on the Create button to create it.
Note: Select one of the available Linux images, for example, Ubuntu Server 20.04 LTS - x64 Gen2 and its parameters according to your business, access, and security needs. Since the parameters of the virtual machine greatly depend on your specific environment and needs, the guidance on these parameters is beyond the scope of this guide and you should treat the example below as a lab environment only.
-
In the virtual machine pane, click on the public IP assigned to this machine to open the
Configuration pane for the IP address associated with the machine.
-
In the Configuration pane for the IP address of the virtual machine, in the DNS
name label (optional) field, enter a unique name that will form part of the FQDN for your virtual
machine, and then click on the Save button.
In this example, we used the name datadog but you can use any name you like.
The FQDN of your virtual machine is the label that you enter followed by the domain name shown under the DNS name label field. You can also see it on the Overview pane as DNS name.
-
Create a port rule to open port 6514.
This is the standard port used by syslog software to collect alerts from external sources such as Portnox Cloud using TLS. The virtual machine must be able to accept information from Portnox Cloud on this port. You can use a different port number than 6514, if needed, but then you have to modify the configuration of syslog-ng and Portnox Cloud.
Generate a certificate for your syslog collector
In this section, you will use OpenSSL software on the virtual machine to generate a self-signed certificate, which Portnox Cloud will use to connect to the collector via TLS.
-
In the virtual machine pane, in the left-hand side menu, click on the Connect option.
-
In the Connect pane, select the preferred SSH connection method to connect to the virtual
machine.
Note: Since the connection method depends on your specific environment, needs, and software, the guidance on the specific method is beyond the scope of this guide. For example, you can use native SSH connection using PuTTY software on Windows and the local key downloaded while creating the virtual machine.
- Optional: If OpenSSL is not installed by default, in your SSH window, type the following commands: sudo apt-get update and sudo apt-get install openssl to install OpenSSL.
-
Generate the certificate using OpenSSL by typing the following commands in your SSH window:
Note: In this example, we use the /etc/ssl/ directory but you can use another directory if you like. However, you will need to adjust further configuration steps.
Install and configure syslog-ng
In this section, you will install syslog-ng on the virtual machine, and configure it to accept events from the network via TLS and send them to Datadog via HTTPS.
- In your SSH window, type the following commands: sudo apt-get update and sudo apt-get install syslog-ng to install syslog-ng software.
- Then, type the following command: sudo nano /etc/syslog-ng/syslog-ng.conf to edit syslog-ng configuration.
-
Follow the steps described in the Datadog documentation for syslog-ng to add the following configuration sections to the
syslog-ng.conf file but modify them as follows:
- In your SSH window, type the following command: sudo systemctl restart syslog-ng to restart syslog-ng after configuration changes.
Result: The syslog-ng software is configured, running, and waiting for events coming through TLS from Portnox Cloud.
Configure Portnox Cloud
In this section, you will learn how to configure Portnox™ Cloud to send alert data using TLS to the virtual machine with syslog-ng so that it forwards the data to the Datadog intake.
-
In the Cloud portal top menu, click on the Settings option.
-
In the Cloud portal left-hand menu, click on the
option.
-
Create a new SIEM integration with Datadog via the collector virtual machine.
- Optional:
To configure the types of alerts sent to your SIEM solution, see the following topic: Portnox Cloud alerts.
Note: To learn more about the content and format of alert messages sent to SIEM solutions, see the following topic: Format and content of alert information for SIEM.
You can also send all of the Portnox Cloud activity log (activities performed by administrators in Portnox Cloud) to your SIEM solution. To do this, go to Activity log switch, and click on the Save button.
, activate the
Result: Datadog is receiving alerts from Portnox Cloud through a secure connection.
You can confirm that, for example, by accessing the Log Explorer.