AWS Route 53 DNS Logs via S3 Setup (Console)
If you have already configured your AWS account to ingest VPC flow logs to Fusion using an S3 bucket and IAM role, the additional steps required to ingest DNS resolver query logs are:
Configure Resolver Query Logging to an S3 bucket in AWS Route 53
Add a DNS AWS S3 traffic source in Fusion for each VPC configured to log resolver queries.
You must collect the information in the table below to add the traffic source to Fusion in step 2.
VPC ID
VPC ID configured for resolver query logging
vpc-04abc123000de4500
Account ID
AWS Account ID
123456789012
Region
The region of the VPC
us-east-1
Bucket
The S3 bucket name
bucket_name
Bucket Region
The region of the S3 bucket
us-east-1
Prefix
Folder prefix
dnslogs
IAM Role ARN
The IAM role ARN used by Fusion to integrate to AWS
arn:aws:iam::123456789012:role/NetographyRole
SQS URL (optional)
Only needed if SQS has been configured
https://sqs.us-east-1.amazonaws.com/123456789012/logq
Configuring Resolver Query Logging in AWS to an S3 bucket
Sign in to the AWS Management Console and open the Route 53 console at https://console.aws.amazon.com/route53/
Expand the Route 53 console menu. Choose the three horizontal bars in the console's upper left corner.
Within the Resolver menu, choose Query logging.
In the Region selector, choose the AWS Region where you want to create the query logging configuration. This must be the same region where you created the VPCs for which you want to log DNS queries. If you have VPCs in multiple Regions, you must create one query logging configuration for each Region.
Choose Configure query logging and fill in the following:
Query logging configuration name - Enter a descriptive name for your query logging configuration.
Query logs destination - Select S3 Bucket
Choose the S3 bucket to log to.
If you are using the same S3 bucket as you are using for flow logs, you can separate DNS logs from VPC flow logs by adding to the end of the S3 bucket a folder name, such as dnslogs. Make a note of the S3 bucket and prefix
VPCs to log queries for - Check the check box for each VPC in the current Region that you want to log then choose Choose. Make a note of the the VPC IDs of each VPC you chose.
For additional details on configuring resolver query logging, see AWS documentation:
Adding a DNS AWS S3 Traffic Source to Fusion
You must add a new DNS traffic source in Fusion for each VPC configured in the previous step.
In Fusion, Navigate to Settings > Traffic Sources
Click ADD TRAFFIC SOURCE
In the DNS section, click AWS S3 VPC
Complete the form with the information you collected in the previous step.
VPC ID
yes
VPC ID of the source
vpc-04abc123000de4500
Account ID
yes
Account ID of the flow source
123456789012
Region
yes
Location of the source
us-east-1
Bucket
yes
The S3 bucket name
bucket_name
Bucket Region
yes
The region of the S3 bucket
us-east-1
Remove Log
no
Remove the log from the S3 bucket after processing
Prefix
no
Folder prefix
dnslogs
SQS URL
no
If provided, SQS will notify Netography that a new object was written for immediate ingest.
In the Authentication section, select Role for AWS Authentication Type and enter the ARN for the IAM role you are using to integrate Fusion to AWS.
Optional AWS Configuration Step: Adding an SNS Topic and SQS Queue
For each VPC you configured for resolver query logging:
Create a SNS topic
Create a SQS queue
Subscribe the SQS queue to the SNS topic
Add event notifications (destined for the SQS queue) in the S3 bucket
Add the SQS queue ARN to IAM permission policy attached to the Fusion IAM role.
1. Create a SNS Topic
Sign in to the Amazon SNS console at: https://console.aws.amazon.com/sns/home
On the navigation panel, choose Topics.
On the Topics page, choose Create topic.
For Type, choose Standard.
Enter a Name for the topic (e.g.
fusion_dns_vpc-04abc123000de4500).Choose Create topic.
Make a note of the topic ARN displayed.
For additional details on creating a SNS topic, see AWS documentation:
https://docs.aws.amazon.com/sns/latest/dg/sns-create-topic.html
2. Create a SQS queue
Open the Amazon SQS console at: https://console.aws.amazon.com/sqs/
Choose Create queue.
For Type, use the default Standard queue type.
Enter a Name for your queue (e.g.
fusion_dns_vpc-04abc123000de4500).In the Configuration section, set the Message retention period to 1 day.
In the Access Policy section, set the Method to Advanced, and paste the following JSON, updating the aws:SourceArn value from
"arn:aws:s3:::<bucketname>"to the S3 bucket ARN you are using.
Choose Create queue. Amazon SQS creates the queue and displays the queue's Details page.
For additional details on creating a SQS queue, see AWS documentation:
3. Subscribe SQS Queue to SNS Topic
After creating the queue, you will see the queue's Details page. Under the SNS Subscriptions Tab, select the Subscribe to Amazon SNS Topic button.
Choose Enter Amazon SNS topic ARN and then enter the SNS topic ARN you noted in the previous step.
Choose Save.
Make a note of your SQS URL and SQS ARN.
4. Add event notifications (destined for the SQS queue) in the S3 bucket
In the AWS console, navigate to S3, select your S3 bucket, and click the Properties tab.
In the Event Notifications section, click Create event notification.
Enter a name for the notification (e.g.
fusion_dns_notification_vpc-04abc123000de4500).The prefix field needs to be set to the path to which the resolver logs for the VPC are being written. This is NOT the same prefix as you set when first configuring the DNS resolver query logs for the VPC (but it starts with that if you set it).
If you set a prefix when configuring the DNS resolver query logs for the VPC to
dnslogs, this path will be:dnslogs/AWSLogs/ACCOUNTID/vpcdnsquerylogs/VPCID. For example, if the query log prefix was set todnslogs, AWS account ID is1234567, and the VPC ID isvpc-987654321, the prefix field should be set to:dnslogs/AWSLogs/1234567/vpcdnsquerylogs/vpc-987654321.If you did not set a prefix, this path will be:
AWSLogs/ACCOUNTID/vpcdnsquerylogs/VPCID. For example, if the AWS account ID is1234567, and the VPC ID isvpc-987654321, the prefix field should be set to:AWSLogs/1234567/vpcdnsquerylogs/vpc-987654321.In the Event Types section, check All objects create events.
In the Destination section, select SQS Queue.
Enter the SQS Queue ARN
Click Save.
5. Add SQS ARN to IAM permission policy attached to the Fusion IAM role
To integrate with AWS, Fusion is configured with an IAM role with a permission policy attached. You must add each SQS ARN you created in the previous steps to the Resource section of this permission policy so that Fusion can receive notifications that new logs are available to ingest.
If you are creating multiple SQS queues, you can collect all the SQS ARN you created in the previous steps and add them to the permission policy in one final step.
Sign in to the AWS Management Console and open the IAM console at: https://console.aws.amazon.com/iam/
In the navigation pane, choose Policies.
In the list of policies, choose the policy name associated with the Netography Fusion IAM role (see the call-out above if you do not know what this is).
Choose the Permissions tab, and then choose Edit.
Choose the JSON option to modify your policy.
In the Resource section of the JSON, add the SQS ARNs that you created in the previous steps.
Choose Save changes to save your work, setting it as the new default policy version.
For additional details on updating the permission policy, see AWS documentation:
Last updated