Overview

This integration ships events from AWS Security Hub to Logz.io. It will automatically deploy resources to your AWS Account.

A new event triggers a designated EventBridge rule, which invokes a Lambda function. The function processes the event and sends it to Logz.io.

Your Lambda function needs to run within the AWS Lambda limits, such as memory allocation and timeout. Make sure you understand these limits. If you can’t adjust your settings to stay within the Lambda limits, you can use the AWS Support Center console to request an increase. Learn more about AWS Lambda Limits.

Automated CloudFormation deployment

Login to your account

To begin, you need to login to your AWS account.

Create a new stack

Select the button below to create a new stack dedicated to sending events from AWS Security Hub to Logz.io.

AWS Region Launch a stack
us-east-1 Deploy to AWS
us-east-2 Deploy to AWS
us-west-1 Deploy to AWS
us-west-2 Deploy to AWS
eu-central-1 Deploy to AWS
eu-north-1 Deploy to AWS
eu-west-1 Deploy to AWS
eu-west-2 Deploy to AWS
eu-west-3 Deploy to AWS
sa-east-1 Deploy to AWS
ca-central-1 Deploy to AWS
ap-northeast-1 Deploy to AWS
ap-northeast-2 Deploy to AWS
ap-northeast-3 Deploy to AWS
ap-south-1 Deploy to AWS
ap-southeast-1 Deploy to AWS
ap-southeast-2 Deploy to AWS

Create stack

Keep the default setting in the Create stack screen and select Next.

Specify the stack details

Specify stack details

Specify the stack details as per the table below and select Next.

Parameter Description
logzioListener Your Logz.io listener url, followed by port 8070 or 8071. The required port depends whether HTTP or HTTPS is used: HTTP = 8070, HTTPS = 8071. For example, https://listener.logz.io:8071
logzioLogLevel Log level for the Lambda function. Defaults to info. Valid options are: debug, info, warn, error, fatal, panic.
logzioOperationsToken Your Logz.io operations token.
Configure the stack options

Configure stack options

Specify the Key and Value parameters for the Tags and select Next.

Review the deployment

Confirm deployment

Confirm that you acknowledge that AWS CloudFormation might create IAM resources and select Create stack.

Deployed resources

This deployment will automatically create the following resources:

Resources

Check Logz.io for your events

Give the stack some time to deploy and the resources to get created. Once this is finished, the stack sends a security event to Logz.io as soon as the event is created on the security hub. You can then see the data in OpenSearch Dashboards.

If you still don’t see your events, see log shipping troubleshooting.

Deployment using a module

Deploy this integration to add a module for AWS security hub to your existing stack. This integration uses Cloudwatch Public Registry.

Logz.io Public Registry extensions are currently only available on the AWS region us-east-1.

At the moment, our AWS Lambda-based integrations do not support working with test events. This functionality is in development.

Before you begin, you’ll need:

  • A CloudFormation stack
Select the Logz.io AWS Security Hub extension
  1. Navigate to CloudFormation > Registry > Public extensions.
  2. Set Extension type > Modules and Publisher > Third party.
  3. Select logzio::awsSecurityHub::collector::MODULE.
Activate the Logz.io AWS Security Hub extension
  1. On the logzio::awsSecurityHub::collector::MODULE select Activate.
  2. In the Extension details section, select Use default.
  3. In the Automatic updates section, select On.
  4. Select Activate extension.
Copy the configuration template

On the logzio::awsSecurityHub::collector::MODULE page, navigate to Example template and select Copy template.

Add your stack values to the configuration template
{
    "Resources": {
        "MyModule": {
            "Type": "logzio::awsSecurityHub::collector::MODULE",
            "Properties": {
                "logzioOperationsToken": "<<LOG-SHIPPING-TOKEN>>",
                "logzioListener": "https://<<LISTENER-HOST>>:8071",
                "logzioLogLevel": "<<LOGZIO-LOG-LEVEL>>"
            }
        }
    }
}

Save the template as a yaml file and add the values of your stack to the as per the table below.

Parameter Description
<<LISTENER-HOST>> Your Logz.io listener url, followed by port 8070 or 8071. For example, https://listener.logz.io:8071
<<LOGZIO-LOG-LEVEL>> Log level for the Lambda function. Defaults to info. Valid options are: debug, info, warn, error, fatal, panic.
<<LOG-SHIPPING-TOKEN>> Your Logz.io operations token.
Add your stack values to the configuration template

If you are creating a new stack:

  1. In step 1 of the Create stack process, select Template is ready.
  2. Select Upload a template file.

If you are editing an existing stack:

  1. Select the stack.
  2. Select Update.
  3. Select Edit template in designer.
  4. Paste the content of the yaml file into the Resources section of the template as follows:

    "Resources": {
         "MyModule": {
             "Type": "logzio::awsSecurityHub::collector::MODULE",
             "Properties": {
                 "logzioOperationsToken": "<<LOG-SHIPPING-TOKEN>>",
                 "logzioListener": "https://<<LISTENER-HOST>>:8071",
                 "logzioLogLevel": "<<LOGZIO-LOG-LEVEL>>"
             }
         }
     }
    
  5. If required, change the module name by editing the "MyModule" value.