It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

How to Configure Log Streaming to AWS CloudWatch

  • Last updated on

To stream log data from your firewall to AWS CloudWatch, you must configure AWS Cloud Integration and configure syslog streaming on the firewall. The IAM role assigned to the firewall instance must include an IAM policy allowing the firewall instance access to AWS CloudWatch. Configure syslog streaming with AWS CloudWatch as the destination. The configured log group is automatically created, and the logs are placed into a folder using either the instance ID or the hostname as the name. No additional configuration is required for AWS CloudWatch to collect the following metrics:

Custom VPN Metrics
  • Client-to-site VPN tunnels        
  • SSL VPN clients
  • Site-to-site VPN tunnels up
  • Site-to-site VPN tunnels down
Custom System Metrics
  • Load
  • Used memory
  • Protected IPs
Custom Firewall Metrics
  • Bytes in
  • Bytes out
  • Bytes total
  • Packets in
  • Packets out
  • Packets total
  • Connections dropped
  • IPS Hits
  • Forwarding Connections new
  • Forwarding Connections total
  • Connections new
  • Connections total
  • Connections blocked
  • Connections failed

Before You Begin

The firewall must be deployed with an IAM role that allows access to AWS CloudWatch. For more information, see How to Create an IAM Role for a CloudGen Firewall in AWS.

 {
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": [
                "logs:CreateLogGroup",
                "logs:CreateLogStream",
                "logs:PutLogEvents",
                "logs:DescribeLogStreams",
                "logs:DescribeLogGroups"
            ],
            "Resource": [
                "arn:aws:logs:*:*:*"
            ]
        }
    ]
}

Step 1. Enable Syslog Streaming

Enable syslog streaming and, optionally, configure the AWS region if it is different from the region of the firewall instance.

  1. Go to CONFIGURATION > Full Configuration > Box > Infrastructure Services > Syslog Streaming.
  2. Click Lock.
  3. Set Enable Syslog Streaming to yes.
    cloudwatch_01.png
  4. In the left menu, expand the Configuration Mode section and click Switch to Advanced View.
  5. Enter the AWS CloudWatch region. E.g., eu-west-1
  6. Click Send Changes and Activate.

Step 2. Configure Logdata Filters

Define profiles specifying the log file types to be transferred / streamed. Log file are classified into top level, box level, and service level log data sources.

  1. Go to CONFIGURATION > Full Configuration > Box >  Infrastructure Services >  Syslog Streaming.
  2. In the left menu, select Logdata Filters.
  3. Click Lock
  4. In the Filters table, click + to add a new filter. The Filters window opens.
  5. Enter a Name
  6. Click OK.
  7. In the  Data Selection table, add the Top Level Log Files log files to be streamed. You can select:
    • Fatal_log
    • Firewall_Audit_Log – Data can be streamed as a part of the firewall service logs.
    • Panic_log

    cloudwatch_02.png
  8. Configure the Box Level Logfile filters:
    1. From the Data Selector list, select which files for this category are streamed:
      • All – All box level logs are streamed.
      • None – Box level logs are not streamed.
      • Selection – Only box level log files defined in the Data Selection list are streamed.
      cloudwatch_03.png
    2. (Selection only) Click + to add custom filters to the Data Selection table. 
      1. In the Log Groups table, click +.
      2. Select the box level log files, or select Other  to enter a user defined log group pattern to stream log files matching this pattern.
      3. (optional) From the Log Level Filter list, select the message types from the log group that are streamed.
      4. (Selection only) In the Selected Messages Types table, click + to add message types.
      cloudwatch_03a.png
  9. Configure the Service Level Logfile filters:
    1. From the Data Selector list, select which files for this category are streamed:
      • All – All service logs are streamed.
      • None – Service level logs are not streamed.
      • Selection – Only service level log files defined in the Data Selection list are streamed.
    2. (Selection only) Click + to add custom filters to the Data Selection table. 
      1. In the Log Groups table, click +.
      2. Select the box level log files, or select Other  to enter a user defined log group pattern to stream log files matching this pattern.
      3. (optional) From the Log Level Filter list, select the message types from the log group that are streamed.
      4. (Selection only) In the Selected Messages Types table, click + to add message types.
      5. Click OK.
    cloudwatch_04.png
  10. Click Send Changes and Activate.

Step 3. Configure AWS CloudWatch as the Logstream Destination

Configure the firewall to send the syslog stream to AWS CloudWatch. The AWS CloudWatch log group name is created automatically, with one stream per firewall.

  1. Go to CONFIGURATION > Full Configuration > Box >  Infrastructure Services >  Syslog Streaming.
  2. In the left menu, select Logstream Destinations.
  3. Click Lock
  4. In the Destinations table, click + to add a new filter. The Destinations window opens.
  5. Enter a Name
  6. Click OK.
  7. From the Logstream Destination list, select AWS CloudWatch.
  8. In the AWS CloudWatch section, enter the name of the AWS CloudWatch log Group Name.
  9. (optional) Select the Stream Name from the drop-down list, or select Other and enter the stream name. The stream name must be unique in the AWS CloudWatch group. 
    cloudwatch_05.png
  10. Click OK.
  11. Click Send Changes and Activate.

Step 4. Configure the Logdata Streams to AWS CloudWatch

Combine the logdata filters and logstream destination to a logdata stream.

  1. Go to CONFIGURATION > Full Configuration > Box >  Infrastructure Services >  Syslog Streaming.
  2. In the left menu, select Logdata Streams.
  3. Click Lock
  4. In the Streams table, click + to add a new syslog stream. The Streams window opens.
  5. Enter a Name
  6. Click OK.  
  7. Set Active Stream to yes.  
  8. In the Log Destinations table, click + and select the logstream destination configured in step 3. 
  9. In the Log Filters table, click + and select the logdata filter configured in step 2.
    cloudwatch_06.png
  10. Click OK
  11. Click Send Changes and Activate

All logs covered by the logdata filter are now streamed to AWS CloudWatch. It might take up to 30 minutes for logs to be displayed in the console.

cloudwatch_07.png