This page has been updated to align with the new Grail security events table. For the complete list of updates and actions needed to accomplish the migration, follow the steps in the Grail security table migration guide.
Dynatrace integration with Akamai allows users to unify and contextualize security findings across tools and products, enabling central prioritization, visualization, and automation.
Akamai products generate security events and detect suspicious network activity. Dynatrace observes the runtime entities protected by those products. Ingesting security events from Akamai products helps users analyze those logs and findings in the context of their runtime production environments.
Dynatrace integration with Akamai is an extension running on Dynatrace ActiveGate. Once you enable and configure the Dynatrace Akamai extension
It periodically reaches out to Akamai SIEM API and fetches the security events.
The raw data is ingested into Dynatrace as logs. If security event extraction is configured, detection events are ingested in addition to the logs mapped to the Dynatrace Semantic Dictionary.
Data is stored as follows:
default_logs
bucketdefault_securityevents
bucketFor details, see Built-in Grail buckets.
In addition to the extension, you have the following integration options:
See below for the Akamai and Dynatrace requirements.
Create authentication credentials with the proper permissions
ActiveGate version 1.300+
Permissions:
storage:logs:read
.storage:security.events:read
.Tokens:
openpipeline.events_security
scope and save it for later. For details, see Dynatrace API - Tokens and authentication.In Dynatrace, search for Akamai and select Install.
Follow the on-screen instructions to configure the extension.
Verify configuration by running the following queries in Notebooks:
For security logs:
fetch logs| filter log.source=="Akamai SIEM"
For finding events (if you configured the extension to extract detection events):
fetch security.events| filter dt.system.bucket == "default_securityevents"| filter event.provider=="Akamai"
Once the extension is installed and working, you can access and manage it in Dynatrace via the Extensions app. For details, see About Extensions.
With the ingested data, you can accomplish various use cases, such as
The geo
namespace maps the corresponding geolocation information of the actor detected in the log.
The http
namespace maps the corresponding HTTP request fields from the monitored transaction.
The url
namespace maps the corresponding web application/URL accessed as the target of the monitored transaction.
The akamai
namespace extracts several Akamai-specific fields for user convenience on top of the original JSON content, which is stored in the log.content
field.
Some extracted fields from which you can benefit include:
akamai.config.id
akamai.attackdata.*
Metric key | Description |
---|---|
log.akamai-siem.volumetric-activity | The count of events matching volume-based activity, such as request rates exceeded or DoS attacks. |
log.akamai-siem.deny_count | The count of events where the rule action is to block the request (deny). |
log.akamai-siem.alert_count | The count of events where the rule action is to allow the request and log a warning (alert). |
log.akamai-siem.monitor_count | The count of events with monitor rule action type. |
log.akamai-siem.total-events | The total number of events processed from Akamai SIEM, regardless of attack type or severity. |
log.akamai-siem.slow-posts | The count of events matching a slow POST attack, which tries to tie up the site using extremely slow requests and responses. |
log.akamai-siem.targeted-web-attacks | The count of events matching specialized web app attacks such as SQL, PHP, command injections, and cross-site scripting. |
log.akamai-siem.generic-web-attacks | The count of events matching generic web app attacks. These include keywords such as Trojan , Web attack tool , Web protocol attack , and Web platform attack . |