Cribl LogStream supports receiving data from the CrowdStrike Falcon platform. CrowdStrike data can then be sent to SIEM, threat-hunting, and other security tools and platforms. This page covers how to configure the Source. Because the Falcon platform pulls data from Amazon S3 buckets maintained by CrowdStrike, some of the configuration described here actually involves S3.
Type: Pull | TLS Support: No | Event Breaker Support: Yes
Configuring a CrowdStrike Source
In the QuickConnect UI: Click + New Source, or click + Add beside Sources. From the resulting drawer's tiles, select [Pull > ] CrowdStrike. Next, click either + Add New or (if displayed) Select Existing. The drawer will now provide the following options and fields.
Or, in the Data Routes UI: From the top nav of a LogStream instance or Group, select Data > Sources. From the resulting page's tiles or the Sources left nav, select [Pull > ] CrowdStrike. Next, click + Add New to open a New Source modal that provides the following options and fields.
The sections described below are spread across several tabs. Click the tab links at left, or the Next and Prev buttons, to navigate among tabs. Click Save when you've configured your Source.
Input ID: Unique ID for this Source. E.g.,
Queue: The name, URL, or ARN of the SQS queue to read notifications from. When a non-AWS URL is specified, format must be:
Filename filter: Regex matching file names to download and process. Defaults to:
Region: AWS Region where the S3 bucket and SQS queue are located. Required, unless Queue is a URL or ARN that includes a Region.
Use the buttons to select an authentication method.
Auto: This default option uses the AWS instance's metadata service to automatically obtain short-lived credentials from the IAM role attached to an EC2 instance. The attached IAM role grants LogStream Workers access to authorized AWS resources. Can also use the environment variables
AWS_SECRET_ACCESS_KEY. Works only when running on AWS.
Manual: If not running on AWS, you can select this option to enter a static set of user-associated IAM credentials (your access key and secret key) directly or by reference. This is useful for Workers not in an AWS VPC, e.g., those running a private cloud. The Manual option exposes these corresponding additional fields:
Access key: Enter your AWS access key. If not present, will fall back to the
env.AWS_ACCESS_KEY_IDenvironment variable, or to the metadata endpoint for IAM role credentials.
Secret key: Enter your AWS secret key. If not present, will fall back to the
env.AWS_SECRET_ACCESS_KEYenvironment variable, or to the metadata endpoint for IAM credentials.
Secret: If not running on AWS, you can select this option to supply a stored secret that references an AWS access key and secret key. The Secret option exposes this additional field:
- Secret key pair: Use the drop-down to select a secret key pair that you've configured in LogStream's internal secrets manager or (if enabled) an external KMS. Follow the Create link if you need to configure a key pair.
Enable for S3: Whether to use Assume Role credentials to access S3. Defaults to
Enable for SQS: Whether to use Assume Role credentials when accessing SQS (Amazon Simple Queue Service). Defaults to
AWS account ID: SQS queue owner's AWS account ID. Leave empty if the SQS queue is in the same AWS account.
AssumeRole ARN: Enter the Amazon Resource Name (ARN) of the role to assume.
External ID: Enter the External ID to use when assuming role.
In this section, you can pass the data from this input to an external command for processing, before the data continues downstream.
Enabled: Defaults to
No. Toggle to
Yes to enable the custom command.
Command: Enter the command that will consume the data (via
stdin) and will process its output (via
Arguments: Click + Add Argument to add each argument to the command. You can drag arguments vertically to resequence them.
In this section, you can apply event breaking rules to convert data streams to discrete events.
Event Breaker rulesets: A list of event breaking rulesets that will be applied, in order, to the input data stream. Defaults to
System Default Rule.
Event Breaker buffer timeout: The amount of time (in milliseconds) that the event breaker will wait for new data to be sent to a specific channel, before flushing out the data stream, as-is, to the routes. Defaults to
In this section, you can add fields/metadata to each event, using Eval-like functionality.
Name: Field name.
Optionally, select a Pipeline to process data from this Source before sending it through the Routes. Otherwise (by default), events will be sent to normal routing and event processing.
Advanced Settings enable you to customize post-processing and administrative options.
Endpoint: The S3 service endpoint you want CrowdStrike to use. If empty, LogStream will automatically construct the endpoint from the region.
Signature version: Signature version to use for signing S3 requests. Defaults to
Reuse connections: Whether to reuse connections between requests. The default setting (
Yes) can improve performance.
Reject unauthorized certificates: Whether to accept certificates that cannot be verified against a valid Certificate Authority (e.g., self-signed certificates). Defaults to
Environment: If you're using GitOps, optionally use this field to specify a single Git branch on which to enable this configuration. If empty, the config will be enabled everywhere.
Select Send to Routes to enable conditional routing, filtering, and cloning of this Source's data via the Routing table.
Select QuickConnect to send this Source’s data to one or more Destinations via independent, direct connections.