SentinelOne Singularity Data Lake

After configuring the Acronis Generic SIEM Connector, you need to follow a few more steps to view Acronis data in your SentinelOne Singularity Data Lake.

  1. Generate SentinelOne api_key to be used in the scalyr agent.json file.
  2. Download and install the scalyr agent on the syslog device where you want to collect the logs.
  3. Apply the following configuration to your agent.json file and replace the api_key with your own api_key.
  4. Copy

    Configuration for the Scalyr Agent

    // Configuration for the Scalyr Agent. For help:
    //
    // https://www.scalyr.com/help/scalyr-agent-2

    {
      // Enter a "Write Logs" api key for your account. These are available at https://www.scalyr.com/keys
      "api_key": "...",

      // Fields describing this server. These fields are attached to each log message, and
      // can be used to filter data from a particular server or group of servers.
      "server_attributes": {
        // Fill in this field if you'd like to override the server's hostname.
        // "serverHost": "REPLACE THIS",

        // You can add whatever additional fields you'd like.
        // "tier": "production"
      },

      // Log files to upload to Scalyr. You can use '*' wildcards here.
      "logs": [
        {
          "path": "/var/log/syslog",
          "attributes": { "parser": "systemLog" },
          "formats": [
            // Process name plus ID. Examples:
            // 2013-03-19T12:25:16.267245+00:00 ip-10-11-222-111 auditd[14957]: Audit daemon rotating log files
            // Feb  3 13:17:00 host-1 dhclient[1576]: DHCPREQUEST on eth0 to 169.108.1.0 port 67 (xid=0x323f0123)
            {
              "format": "$timestamp=timestamp$ $host$ $process$\\[$procid$\\]: $text$",
              "halt": true
            },

            // Process name with no ID. Examples:
            // Feb  3 03:47:01 host-1 rsyslogd: [origin software="rsyslogd" swVersion="5.8.03" x-pid="1631" x-info="http://www.rsyslog.com"] rsyslogd was HUPed
            // Mar 17 04:34:12 li58-102 dhclient: DHCPREQUEST on eth0 to 206.192.11.29 port 67
            {
              "format": "$timestamp=timestamp$ $host$ $process$: $text$",
              "halt": true
            },

            // CEF log format
            {
              "format": "$timestamp=timestamp$ $host$ $process$: $facility_version$ $cef_version$ $vendor$|$product$|$version$|$event_class_id$|$name$|$severity$|$extension$",
              "halt": true
            }
          ]
        }
      ],

      "monitors": [

      ]
    }
  5. Replace the path with the one that leads to your syslog directory and save the agent.json file.

  6. Restart the scalyr agent to ensure that your changes were implemented.

Acronis alerts look like this inside SentinelOne Singularity Data Lake:

To view the Acronis alerts in a different format, switch to your preferred parser.