Confidential

Cisco Umbrella Configuration

Overview

Cisco Umbrella is a SaaS product that stores its logs in the S3 bucket. The overall process of integration is to

  1. Ensure that the logs are stored in the S3 bucket provided by Cisco or owned by the customer.

  2. Providing these S3 bucket credentials to integrate these logs in the Seceon product.

This document describes both of these steps.

Ref. Link: https://docs.umbrella.com/deployment-umbrella/docs/log-management

Storing logs in S3 bucket

The logs are stored in the S3 bucket that can be owned by either Cisco itself or the Cisco Umbrella subscriber (your own). We will go through Cisco Umbrella configuration for both of these ownership.

Enable Logging to Your Own S3 Bucket

Prerequisites

  • Full administrative access to the Cisco Muti-org console

  • A login to AWS Management Console. If you don't have an account, Amazon provides free sign up for S3.
    Note: Amazon requires a credit card in case your usage exceeds free plan usage.

  • A bucket configured in Amazon S3 to be used for storing logs. For more information, see Set up an Amazon S3 Bucket and Amazon S3 documentation.

Enable Logging

  • Navigate to Console Settings > Log Management and select Use your company-managed Amazon S3 bucket.

  • In the Bucket Name field, type or paste the exact bucket name you created in Amazon S3 and click Verify.
    Umbrella verifies your bucket, connects to it, and saves a README_FROM_UMBRELLA.txt file to your bucket.

  • Open the README_FROM_UMBRELLA.txt file Umbrella saved to your bucket, copy and paste the token listed in it into Token Number, and click Save.


Manage Logs < Enable Logging to Your Own S3 Bucket > Set up an Amazon S3 Bucket

Set up an Amazon S3 Bucket

Before you can configure the Multi-or console to store your organization's logs to your own self-managed Amazon S3 bucket, you must first set up an Amazon S3 bucket. For information about how to do this, see Amazon's S3 documentation.

JSON Bucket Policy

When setting up your bucket, you are required to add a bucket policy so that your bucket can accept uploads from your organizations' Umbrella dashboards. Copy and paste the following JSON string, which contains the preconfigured Umbrella bucket policy, into your Amazon S3 policy.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 { "Version": "2008-10-17", "Statement": [ { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::568526795995:user/logs" }, "Action": "s3:PutObject", "Resource": "arn:aws:s3:::bucketname/*" }, { "Sid": "", "Effect": "Deny", "Principal": { "AWS": "arn:aws:iam::568526795995:user/logs" }, "Action": "s3:GetObject", "Resource": "arn:aws:s3:::bucketname/*" }, { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::568526795995:user/logs" } , "Action": "s3:GetBucketLocation", "Resource": "arn:aws:s3:::bucketname" }, { "Sid": "", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::568526795995:user/logs" }, "Action": "s3:ListBucket", "Resource": "arn:aws:s3:::bucketname" } ] }

Enable Logging to Your Own S3 Bucket < Set up an Amazon S3 Bucket > Enable Logging to a Cisco-managed S3 Bucket

Enable Logging to Cisco Managed S3 Bucket

Steps of Configuration

  1. Navigate to Admin > Log Management and select Use a Cisco-managed Amazon S3 bucket.

 

  1. Select a Region and a Retention Duration.

 

  • Select a Region—Regional endpoints are important to minimize latency when downloading logs to your servers. The regions match those available in Amazon S3; however, not all regions are available. For example, China is not listed.
    Pick the region that's closest to you from the dropdown. If you wish to change your region in the future, you will need to delete your current settings and start over.

  • Select a Retention Duration—Select 7, 14, or 30 days. Beyond the selected time period, all data will be purged and cannot be retrieved. We recommend a smaller time period if your ingestion cycle is regular. The retention duration can be changed at any time.

  1. Click Save and then Continue to confirm your settings.

Umbrella activates its ability to export to an AWS S3 account. When activation is complete, the Amazon S3 Summary page appears.

 

  1. Copy credentials from this page and store them in a safe place. This is the only time that the Access and Secret keys are made available to you. These keys are required to access your S3 bucket and download logs. If you lose these keys, they must be regenerated.

  2. Once keys are copied and safe, check Got it and then click Continue.
    Note: Continue is unavailable until you check Got it.

 

S3 Bucket Data Path

The Umbrella Amazon S3 Summary page provides the Data Path to your Amazon bucket. An Umbrella data path contains the following path fields:

1 2 <AWS S3 bucket name>-<AWS region>/<AWS S3 bucket directory prefix>
  1. AWS S3 bucket name and AWS region—the name of the AWS S3 bucket managed by Cisco (cisco-managed), a dash (-), and the AWS region.

  2. AWS S3 bucket directory prefix—the directory prefix (customer folder name) to the Cisco-managed AWS S3 bucket.

Sample S3 Bucket Data Path:

1 2 cisco-managed-us-west-1/2069997_6ff2802af17337def701c2e7816cf14913zf848a

Enable Logging to Your Own S3 Bucket < Enable Logging to a Cisco-managed S3 Bucket > Change the Location of Event Data Logs

 

Configuring Cisco Umbrella S3 bucket in Seceon

  1. Login to the tenant as an Administrator

  2. Go into the Provisioning Cloud DevicesAWS ConfigurationConfigure Cisco umbrella services

  3. Fill in the required inputs in configuration from your environment.

  • Access Key ID: Access Key

  • Secret Access Key: Secret Key

  • Region: Storage Region

  • Storage Type: S3 Bucket

  • Storage name: S3 Bucket Data Path

  • CCE IP: IP Address of CCE

Click on Save

At this point, the system will start to get the Cisco Umbrella logs from the S3 Bucket that you configured.