Log Ingestion CyberDoyen SIEM ingests log data from multiple sources in real-time to provide comprehensive security monitoring and threat detection.
This page covers how to configure and manage log ingestion from various sources.
Supported Log Sources
Source Type | Example Products | Ingestion Method |
---|---|---|
Syslog | Firewalls, Routers, Linux Servers | Syslog Listener (UDP/TCP) |
Windows Event Logs | Windows Servers, Desktops | Winlogbeat / Agent |
Cloud Services | AWS CloudTrail, Azure Activity Logs | API Pull / Agent |
Applications | Nginx, Apache, Custom Apps | Filebeat / API |
Default Ingestion Ports
Protocol | Port | Purpose |
---|---|---|
UDP | 514 | Syslog Ingestion (default) |
TCP | 6514 | Secure Syslog (TLS) |
TCP | 5044 | Beats (Filebeat, Winlogbeat) ingestion |
Tip: You can customize these ports in the configuration files during installation.
Configuring Syslog Ingestion
Open your CyberDoyen SIEM configuration directory.
Edit the syslog.yml
file to configure listeners:
syslog.yml
listen_udp: true
listen_tcp: true
udp_port: 514
tcp_port: 6514
tls_enabled: true
certificate_path: "/etc/cyberdoyen/certs/server.crt"
private_key_path: "/etc/cyberdoyen/certs/server.key"
Restart the CyberDoyen Ingestion Service:
Linux:
sudo systemctl restart cyberdoyen-ingestion
Windows:
Restart-Service cyberdoyen-ingestion
Configuring Beats (Filebeat, Winlogbeat)
CyberDoyen SIEM supports native Beats protocols for structured log ingestion.
Sample filebeat.yml
output configuration:
output.logstash:
hosts: ["siem-server.local:5044"]
ssl.enabled: true
ssl.certificate_authorities: ["/etc/ssl/certs/ca.crt"]
Ensure the port 5044 is open between Beats agents and your SIEM server.
Configuring Cloud Ingestion
CyberDoyen supports fetching cloud logs using secure API credentials.
Example for AWS CloudTrail:
aws:
access_key_id: YOUR_ACCESS_KEY
secret_access_key: YOUR_SECRET_KEY
regions:
- us-east-1
- eu-central-1
services:
- cloudtrail
- cloudwatch
poll_interval: 300 # seconds
Note: Secure your API keys and apply least-privilege policies for security.
Monitoring Ingestion Health
To verify if logs are being ingested correctly:
Check SIEM dashboards under Log Sources.
Use the built-in ingestion health API:
curl -X GET "https://siem-server.local:9200/_ingestion/health"
Expected response:
{
"syslog_sources": 12,
"beats_sources": 5,
"cloud_sources": 3,
"status": "healthy"
}
Conclusion
Correct log ingestion configuration is crucial for complete security coverage. Make sure to monitor your ingestion health and tune buffer sizes as your environment scales.