Ingest Akamai security logs and events

Latest Dynatrace Preview

Dynatrace integration with Akamai allows users to unify and contextualize security findings across tools and products, enabling central prioritization, visualization, and automation.

Akamai products generate security events and detect suspicious network activity. Dynatrace observes the runtime entities protected by those products. Ingesting security events from Akamai products helps users analyze those logs and findings in the context of their runtime production environments.

How it works

how it works

Dynatrace integration with Akamai is an extension running on Dynatrace ActiveGate. Once you enable and configure the Dynatrace Akamai extension

  1. It periodically reaches out to Akamai SIEM API and fetches the security events.

  2. The raw data is ingested into Dynatrace as logs. If security event extraction is configured, detection events are ingested in addition to the logs mapped to the Dynatrace semantic conventions.

  3. Data is stored as follows:

    • Logs are stored in the default_logs bucket
    • Security events are stored in the default_security_custom_events bucket

    For details, see Built-in Grail buckets.

Additional integrations

In addition to the extension, you have the following integration options:

Prerequisites

See below for the Akamai and Dynatrace requirements.

Akamai requirements

Create authentication credentials with the proper permissions

Dynatrace requirements

  • ActiveGate version 1.300+

  • Permissions: For a list of permissions required, go to Dynatrace Hub Hub, select Extensions Extensions, and display Technical information.

  • Generate an access token with the openpipeline.events_security scope.

Get started

  1. In Dynatrace, search for Akamai and select Install.

  2. Follow the on-screen instructions to configure the extension.

  3. Verify configuration by running the following queries in Notebooks:

    • For security logs:

      fetch logs
      | filter log.source=="Akamai SIEM"
    • For finding events (if you configured the extension to extract detection events):

      fetch events
      | filter dt.system.bucket == "default_security_custom_events"
      | filter event.kind == "SECURITY_EVENT"
      AND event.provider=="Akamai"
  4. Once the extension is installed and working, you can access and manage it in Dynatrace via the Extensions Extensions app. For details, see Extensions 2.0 concepts.

Use cases

With the ingested data, you can accomplish various use cases, such as

Frequently asked questions (FAQ)

Which data model is used for the security logs and events coming from Akamai SIEM integration?

  • Logs - all the Akamai SIEM data is ingested as logs. The log follows the basic schema for logs with a few relevant extensions of namespaces, such as geo, http, and url.

  • Detection finding events Coming soon

Which extension fields are added on top of the core fields of the events ingested from Akamai?

  • The geo namespace maps the corresponding geolocation information of the actor detected in the log.

  • The http namespace maps the corresponding HTTP request fields from the monitored transaction.

  • The url namespace maps the corresponding web application/URL accessed as the target of the monitored transaction.

  • The akamai namespace extracts several Akamai-specific fields for user convenience on top of the original JSON content, which is stored in the log.content field.

Some extracted fields from which you can benefit include:

  • akamai.config.id

  • akamai.attackdata.*

Which metrics are extracted automatically with the Akamai extension?

Metric key
Description
log.akamai-siem.volumetric-activity
The count of events matching volume-based activity, such as request rates exceeded or DoS attacks.
log.akamai-siem.deny_count
The count of events where the rule action is to block the request (deny).
log.akamai-siem.alert_count
The count of events where the rule action is to allow the request and log a warning (alert).
log.akamai-siem.monitor_count
The count of events with monitor rule action type.
log.akamai-siem.total-events
The total number of events processed from Akamai SIEM, regardless of attack type or severity.
log.akamai-siem.slow-posts
The count of events matching a slow POST attack, which tries to tie up the site using extremely slow requests and responses.