Cisco Umbrella DNS Logs via S3 Setup (Console)
If you have already configured your Cisco Umbrella DNS Logs be stored in an AWS S3 bucket these steps can have them ingested into Fusion:
Enable Cisco Umbrella DNS Log Export to S3: Configure Cisco Umbrella to export DNS logs to an AWS S3 bucket.
Cisco Umbrella DNS Query Log Source in Fusion: Add a Cisco Umbrella DNS traffic source in Fusion for each log source.
You will need the following information to configure Fusion:
Region (optional)
The region of the log source
us-east-1
Bucket
The S3 bucket name
bucket_name
Bucket Region
The region of the S3 bucket
us-east-1
Prefix
Folder prefix
dnslogs
IAM Role ARN
The IAM role ARN used by Fusion to integrate to AWS
arn:aws:iam::123456789012:role/NetographyRole
SQS URL (optional)
Only needed if SQS has been configured
https://sqs.us-east-1.amazonaws.com/123456789012/logq
Step 1: Enable Cisco Umbrella DNS Log Export to S3
Log in to the Cisco Umbrella Dashboard.
Navigate to Admin > Log Management.
Under Log Export Settings, select Amazon S3 as the log destination.
Configure the following:
Bucket Name: The S3 bucket where logs will be exported. If you already have a bucket used for other logs, you can reuse it.
Region: The AWS region of the S3 bucket.
Prefix: Specify a prefix to separate Cisco Umbrella logs from other logs (e.g., cisco-umbrella-logs).
Save the configuration and confirm that Cisco Umbrella is exporting logs to the bucket.
Step 2: Add a Cisco Umbrella DNS Traffic Source in Fusion
In Fusion, Navigate to Settings > Traffic Sources
Click ADD TRAFFIC SOURCE
In the DNS section, click Cisco Umbrella
Complete the form with the information you collected in the previous step.
Name
yes
Name of the traffic source
my-query-logs
S3 Bucket Name
yes
S3 bucket where Cisco Umbrella logs are stored
umbrella-dns-logs
S3 Bucket Region
yes
AWS region of the S3 bucket
us-east-1
Prefix
no
Folder prefix for Cisco Umbrella logs
cisco-umbrella-logs
SQS URL
no
If provided, SQS will notify Netography that a new object was written for immediate ingest
In the Authentication section, select Role for AWS Authentication Type and enter the ARN for the IAM role you are using to integrate Fusion to AWS.
Optional AWS Configuration Step: Adding an SNS Topic and SQS Queue
For each traffic source you configured for resolver query logging:
Create a SNS topic
Create a SQS queue
Subscribe the SQS queue to the SNS topic
Add event notifications (destined for the SQS queue) in the S3 bucket
Add the SQS queue ARN to IAM permission policy attached to the Fusion IAM role.
1. Create a SNS Topic
Sign in to the Amazon SNS console at: https://console.aws.amazon.com/sns/home
On the navigation panel, choose Topics.
On the Topics page, choose Create topic.
For Type, choose Standard.
Enter a Name for the topic (e.g.
fusion_umbrella-dns-logs_1234).Choose Create topic.
Make a note of the topic ARN displayed.
For additional details on creating a SNS topic, see AWS documentation:
https://docs.aws.amazon.com/sns/latest/dg/sns-create-topic.html
2. Create a SQS queue
Open the Amazon SQS console at: https://console.aws.amazon.com/sqs/
Choose Create queue.
For Type, use the default Standard queue type.
Enter a Name for your queue (e.g.
fusion_umbrella-dns-logs_1234).In the Configuration section, set the Message retention period to 1 day.
In the Access Policy section, set the Method to Advanced, and paste the following JSON, updating the aws:SourceArn value from
"arn:aws:s3:::<bucketname>"to the S3 bucket ARN you are using.
Choose Create queue. Amazon SQS creates the queue and displays the queue's Details page.
For additional details on creating a SQS queue, see AWS documentation:
3. Subscribe SQS Queue to SNS Topic
After creating the queue, you will see the queue's Details page. Under the SNS Subscriptions Tab, select the Subscribe to Amazon SNS Topic button.
Choose Enter Amazon SNS topic ARN and then enter the SNS topic ARN you noted in the previous step.
Choose Save.
Make a note of your SQS URL and SQS ARN.
4. Add event notifications (destined for the SQS queue) in the S3 bucket
In the AWS console, navigate to S3, select your S3 bucket, and click the Properties tab.
In the Event Notifications section, click Create event notification.
Enter a name for the notification (e.g.
fusion_umbrella-dns-notification_1234).The prefix field needs to be set to the path to which the resolver logs for the VPC are being written. This is NOT the same prefix as you set when first configuring the DNS resolver query logs for the VPC (but it starts with that if you set it).
If you set a prefix when configuring the DNS resolver query logs for the traffic source to
dnslogs, this path will be:dnslogs/.If you did not set a prefix, this path will be:
/.In the Event Types section, check All objects create events.
In the Destination section, select SQS Queue.
Enter the SQS Queue ARN
Click Save.
5. Add SQS ARN to IAM permission policy attached to the Fusion IAM role
To integrate with AWS, Fusion is configured with an IAM role with a permission policy attached. You must add each SQS ARN you created in the previous steps to the Resource section of this permission policy so that Fusion can receive notifications that new logs are available to ingest.
If you are creating multiple SQS queues, you can collect all the SQS ARN you created in the previous steps and add them to the permission policy in one final step.
Sign in to the AWS Management Console and open the IAM console at: https://console.aws.amazon.com/iam/
In the navigation pane, choose Policies.
In the list of policies, choose the policy name associated with the Netography Fusion IAM role (see the call-out above if you do not know what this is).
Choose the Permissions tab, and then choose Edit.
Choose the JSON option to modify your policy.
In the Resource section of the JSON, add the SQS ARNs that you created in the previous steps.
Choose Save changes to save your work, setting it as the new default policy version.
For additional details on updating the permission policy, see AWS documentation:
Last updated