Skip to main content

Cloud-delivered Advanced AnalyticsExabeam Advanced Analytics Administration Guide

Log Ingestion Settings

To configure log ingestion settings in Advanced Analytics:

  1. In the sidebar, click SETTINGSA grey gear icon, then select Analytics.

  2. Under Log Management, select Log Ingestion Settings.

  3. Log ingestion settings are different depending on which version of Advanced Analytics you are using. Click the appropriate links below for more information.

Log ingestion is handled via a unified ingestion pipeline (UIP). Visibility into the UIP is provided through the cloud-native Log Stream and Live Tail functionality.

Log data enters the UIP through a set of collector services. These services collect data from servers, applications, databases, and other devices across an infrastructure, whether the source is local, remote, or cloud-based.

In the UIP, the ingested logs are processed into events that conform to the hierarchical common information model. These events are then processed through a UIP Advanced Analytics Integration service that transforms them into events that are readable by Advanced Analytics.

For information about setting up specific collector services, see the following:

Log ingestion is handled by the LIME engine (Log Ingestion and Message Extraction). LIME can fetch data from SIEM log repositories or ingest it via Syslog. It normalizes the raw logs into events that the rest of the Advanced Analytics pipeline can process.

Currently, log ingestion is supported from the sources listed below.

  • Data Lake

  • Splunk

  • ServiceNow

  • HP ArcSight

  • IBM QRadar

  • McAfee Nitro

  • RSA Security Analytics

  • Sumo Logic

  • Google Cloud Pub/Sub

On the Log Ingestion Settings page in Advanced Analytics, you can do the following:

  • Enable Syslog Ingestion

  • Configure Syslog Options

  • View Syslog Stats

  • Add a New Log Source

For Splunk and QRadar, log ingestion occurs via external APIs. Syslog is used for the other sources. For SIEM solutions, such as LogRhythm, McAfee ESM, and LogLogic, ingestion occurs via Syslog forwarding.

Note

The Syslog destination is your site collector IP/FQDN. Only TLS connections are accepted in port TCP/515.

For more information about about configuring log ingestion in this version of Advanced Analytics, see the following subsections: