Skip to content

Unit 3: SIEM integration — native forwarding to Splunk, Sentinel, Elastic, Datadog #48

@TeoSlayer

Description

@TeoSlayer

Scope

Native audit log forwarding to enterprise SIEM platforms. Beyond slog file output — direct integration with collection APIs.

Deliverables

  • Splunk: HTTP Event Collector (HEC) integration with source type, index, correlation fields
  • Microsoft Sentinel: Azure Monitor Data Collection Rules (DCR) ingestion
  • Elastic: direct Elasticsearch indexing or Filebeat-compatible JSON output with ECS field mapping
  • Datadog: Datadog Logs API with facet mapping
  • Universal syslog forwarding (RFC 5424) for on-premise SIEM
  • Configuration: SIEM endpoint, credentials, batch size, retry policy
  • Field mapping: audit events → SIEM-native schema (CIM for Splunk, ECS for Elastic)

Files

  • pkg/registry/siem.go — SIEM forwarder implementations
  • pkg/daemon/siem.go — daemon-side forwarding
  • tests/ — SIEM integration tests (mock collectors)

Priority: HIGH

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions