SecurityLake / Client / create_custom_log_source

create_custom_log_source#

SecurityLake.Client.create_custom_log_source(**kwargs)#

Adds a third-party custom source in Amazon Security Lake, from the Amazon Web Services Region where you want to create a custom source. Security Lake can collect logs and events from third-party custom sources. After creating the appropriate IAM role to invoke Glue crawler, use this API to add a custom source name in Security Lake. This operation creates a partition in the Amazon S3 bucket for Security Lake as the target location for log files from the custom source. In addition, this operation also creates an associated Glue table and an Glue crawler.

See also: AWS API Documentation

Request Syntax

response = client.create_custom_log_source(
    configuration={
        'crawlerConfiguration': {
            'roleArn': 'string'
        },
        'providerIdentity': {
            'externalId': 'string',
            'principal': 'string'
        }
    },
    eventClasses=[
        'string',
    ],
    sourceName='string',
    sourceVersion='string'
)
Parameters:
  • configuration (dict) –

    [REQUIRED]

    The configuration for the third-party custom source.

    • crawlerConfiguration (dict) – [REQUIRED]

      The configuration for the Glue Crawler for the third-party custom source.

      • roleArn (string) – [REQUIRED]

        The Amazon Resource Name (ARN) of the Identity and Access Management (IAM) role to be used by the Glue crawler. The recommended IAM policies are:

        • The managed policy AWSGlueServiceRole

        • A custom policy granting access to your Amazon S3 Data Lake

    • providerIdentity (dict) – [REQUIRED]

      The identity of the log provider for the third-party custom source.

      • externalId (string) – [REQUIRED]

        The external ID used to estalish trust relationship with the AWS identity.

      • principal (string) – [REQUIRED]

        The AWS identity principal.

  • eventClasses (list) –

    The Open Cybersecurity Schema Framework (OCSF) event classes which describes the type of data that the custom source will send to Security Lake. The supported event classes are:

    • ACCESS_ACTIVITY

    • FILE_ACTIVITY

    • KERNEL_ACTIVITY

    • KERNEL_EXTENSION

    • MEMORY_ACTIVITY

    • MODULE_ACTIVITY

    • PROCESS_ACTIVITY

    • REGISTRY_KEY_ACTIVITY

    • REGISTRY_VALUE_ACTIVITY

    • RESOURCE_ACTIVITY

    • SCHEDULED_JOB_ACTIVITY

    • SECURITY_FINDING

    • ACCOUNT_CHANGE

    • AUTHENTICATION

    • AUTHORIZATION

    • ENTITY_MANAGEMENT_AUDIT

    • DHCP_ACTIVITY

    • NETWORK_ACTIVITY

    • DNS_ACTIVITY

    • FTP_ACTIVITY

    • HTTP_ACTIVITY

    • RDP_ACTIVITY

    • SMB_ACTIVITY

    • SSH_ACTIVITY

    • CONFIG_STATE

    • INVENTORY_INFO

    • EMAIL_ACTIVITY

    • API_ACTIVITY

    • CLOUD_API

    • (string) –

  • sourceName (string) –

    [REQUIRED]

    Specify the name for a third-party custom source. This must be a Regionally unique value.

  • sourceVersion (string) – Specify the source version for the third-party custom source, to limit log collection to a specific version of custom data source.

Return type:

dict

Returns:

Response Syntax

{
    'source': {
        'attributes': {
            'crawlerArn': 'string',
            'databaseArn': 'string',
            'tableArn': 'string'
        },
        'provider': {
            'location': 'string',
            'roleArn': 'string'
        },
        'sourceName': 'string',
        'sourceVersion': 'string'
    }
}

Response Structure

  • (dict) –

    • source (dict) –

      The created third-party custom source.

      • attributes (dict) –

        The attributes of a third-party custom source.

        • crawlerArn (string) –

          The ARN of the Glue crawler.

        • databaseArn (string) –

          The ARN of the Glue database where results are written, such as: arn:aws:daylight:us-east-1::database/sometable/*.

        • tableArn (string) –

          The ARN of the Glue table.

      • provider (dict) –

        The details of the log provider for a third-party custom source.

        • location (string) –

          The location of the partition in the Amazon S3 bucket for Security Lake.

        • roleArn (string) –

          The ARN of the IAM role to be used by the entity putting logs into your custom source partition. Security Lake will apply the correct access policies to this role, but you must first manually create the trust policy for this role. The IAM role name must start with the text ‘Security Lake’. The IAM role must trust the logProviderAccountId to assume the role.

      • sourceName (string) –

        The name for a third-party custom source. This must be a Regionally unique value.

      • sourceVersion (string) –

        The version for a third-party custom source. This must be a Regionally unique value.

Exceptions