Latest Dynatrace Preview
Dynatrace integration with Akamai allows users to unify and contextualize security findings across tools and products, enabling central prioritization, visualization, and automation.
Akamai products generate security events and detect suspicious network activity. Dynatrace observes the runtime entities protected by those products. Ingesting security events from Akamai products helps users analyze those logs and findings in the context of their runtime production environments.
Dynatrace integration with Akamai is an extension running on Dynatrace ActiveGate. Once you enable and configure the Dynatrace Akamai extension
It periodically reaches out to Akamai SIEM API and fetches the security events.
The raw data is ingested into Dynatrace as logs. If security event extraction is configured, detection events are ingested in addition to the logs mapped to the Dynatrace semantic conventions.
Data is stored as follows:
default_logs
bucketdefault_security_custom_events
bucketFor details, see Built-in Grail buckets.
In addition to the extension, you have the following integration options:
See below for the Akamai and Dynatrace requirements.
Create authentication credentials with the proper permissions
ActiveGate version 1.300+
Permissions: For a list of permissions required, go to Dynatrace Hub , select Extensions
, and display Technical information.
Generate an access token with the openpipeline.events_security
scope.
In Dynatrace, search for Akamai and select Install.
Follow the on-screen instructions to configure the extension.
Verify configuration by running the following queries in Notebooks:
For security logs:
fetch logs| filter log.source=="Akamai SIEM"
For finding events (if you configured the extension to extract detection events):
fetch events| filter dt.system.bucket == "default_security_custom_events"| filter event.kind == "SECURITY_EVENT"AND event.provider=="Akamai"
Once the extension is installed and working, you can access and manage it in Dynatrace via the Extensions app. For details, see Extensions 2.0 concepts.
With the ingested data, you can accomplish various use cases, such as
The geo
namespace maps the corresponding geolocation information of the actor detected in the log.
The http
namespace maps the corresponding HTTP request fields from the monitored transaction.
The url
namespace maps the corresponding web application/URL accessed as the target of the monitored transaction.
The akamai
namespace extracts several Akamai-specific fields for user convenience on top of the original JSON content, which is stored in the log.content
field.
Some extracted fields from which you can benefit include:
akamai.config.id
akamai.attackdata.*
log.akamai-siem.volumetric-activity
log.akamai-siem.deny_count
log.akamai-siem.alert_count
log.akamai-siem.monitor_count
log.akamai-siem.total-events
log.akamai-siem.slow-posts