This page has been updated to align with the new Grail security events table. For the complete list of updates and actions needed to accomplish the migration, follow the steps in the Grail security table migration guide.



Ingest logs and security events from Akamai products.
Dynatrace integration with Akamai allows you to unify and contextualize security findings across tools and products, enabling central prioritization, visualization, and automation.
Akamai products generate security events and detect suspicious network activity. Dynatrace observes the runtime entities protected by those products. Ingesting security events from Akamai products helps users analyze those logs and findings in the context of their runtime production environments.
Single pane of glass: Ingest security findings from Akamai products into Dynatrace (powered by OpenPipeline™).
Unified analysis: Dynatrace transforms and maps the findings to a unified format for detection findings (powered by Dynatrace Semantic Dictionary).
Findings operationalization: Prioritize, visualize, and automate detection findings with runtime context
Unveil blind spots: Discover and eliminate security coverage gaps in your environment.
With the ingested data, you can accomplish various use cases, such as
See below for the Akamai and Dynatrace requirements.
Create authentication credentials with the proper permissions
ActiveGate version 1.300+
Permissions:
, select Extensions
, and display Technical information.storage:logs:read.storage:security.events:read.Tokens:
openpipeline.events_security scope and save it for later. For details, see Dynatrace API - Tokens and authentication.In Dynatrace, search for Akamai and select Install.
Follow the on-screen instructions to configure the extension.
Verify configuration by running the following queries in Notebooks:
For security logs:
fetch logs| filter log.source=="Akamai SIEM"
For finding events (if you configured the extension to extract detection events):
fetch security.events| filter dt.system.bucket == "default_securityevents"| filter event.provider=="Akamai"
Once the extension is installed and working, you can access and manage it in Dynatrace via the Extensions
app. For details, see About Extensions.

Dynatrace integration with Akamai is an extension running on Dynatrace ActiveGate. Once you enable and configure the Dynatrace Akamai extension
It periodically reaches out to Akamai SIEM API and fetches the security events.
The raw data is ingested into Dynatrace as logs. If security event extraction is configured, detection events are ingested in addition to the logs mapped to the Dynatrace Semantic Dictionary.
Data is stored as follows:
default_logs bucketdefault_securityevents bucketFor details, see Built-in Grail buckets.
In addition to the extension, you have the following integration options:
For billing information, see Events powered by Grail.
When activating your extension using monitoring configuration, you can limit monitoring to one of the feature sets. To work properly the extension has to collect at least one metric after the activation.
In highly segmented networks, feature sets can reflect the segments of your environment. Then, when you create a monitoring configuration, you can select a feature set and a corresponding ActiveGate group that can connect to this particular segment.
All metrics that aren't categorized into any feature set are considered to be the default and are always reported.
A metric inherits the feature set of a subgroup, which in turn inherits the feature set of a group. Also, the feature set defined on the metric level overrides the feature set defined on the subgroup level, which in turn overrides the feature set defined on the group level.
| Metric name | Metric key | Description |
|---|---|---|
| Ingested logs | sfm.akamai-siem.ingested.logs | The number of log records ingested by the extension. |
| Ingested logs bytes | sfm.akamai-siem.ingested.logs_bytes | The volume of bytes ingested by the extension as logs. |
| Ingested security events | sfm.akamai-siem.ingested.security_events | The number of security events ingested by the extension. |
| Ingested security events bytes | sfm.akamai-siem.ingested.security_events_bytes | The volume of bytes ingested by the extension as security events. |
The geo namespace maps the corresponding geolocation information of the actor detected in the log.
The http namespace maps the corresponding HTTP request fields from the monitored transaction.
The url namespace maps the corresponding web application/URL accessed as the target of the monitored transaction.
The akamai namespace extracts several Akamai-specific fields for user convenience on top of the original JSON content, which is stored in the log.content field.
Some extracted fields from which you can benefit include:
akamai.config.id
akamai.attackdata.*
| Metric key | Description |
|---|---|
log.akamai-siem.volumetric-activity | The count of events matching volume-based activity, such as request rates exceeded or DoS attacks. |
log.akamai-siem.deny_count | The count of events where the rule action is to block the request (deny). |
log.akamai-siem.alert_count | The count of events where the rule action is to allow the request and log a warning (alert). |
log.akamai-siem.monitor_count | The count of events with monitor rule action type. |
log.akamai-siem.total-events | The total number of events processed from Akamai SIEM, regardless of attack type or severity. |
log.akamai-siem.slow-posts | The count of events matching a slow POST attack, which tries to tie up the site using extremely slow requests and responses. |
log.akamai-siem.targeted-web-attacks | The count of events matching specialized web app attacks such as SQL, PHP, command injections, and cross-site scripting. |
log.akamai-siem.generic-web-attacks | The count of events matching generic web app attacks. These include keywords such as Trojan, Web attack tool, Web protocol attack, and Web platform attack. |