-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SYSLOG collector infrastructure for Cortex XSIAM #6112
Comments
IN addition to have connectivity to MoJ-TGW, can we also have connectivity to NOC-TGW. It is needed because 102PF management network has a VPN connectivity with NOC-TGW and this SYSLOG collector needs to be able to collect SYSLOGS from networking alliances in 102PF too. Thank you. |
As @davidkelliott requested, I am sharing the design proposal here:
I have attached the HLD of the proposed VPC here. |
Looking at this one in conjunction with #6048 |
The bulk of the work here has been done, but I'm also working through the RAM share bug. Once I've got a solution for that I'll be able to progress this on to the TGW connectivity questions. |
Hello @mTouhid 👋 Welcome to the Modernisation Platform! Your new accounts have now been created. Please see our user guidance for details on how to build and access infrastructure in the Modernisation Platform. If you require help or assistance please contact us via the #ask-modernisation-platform Slack channel. |
OK! The RAM share bug has been resolved. I've created a 1 point issue for the firewall rules, and will create another issue for the NOC-TGW peering. |
Environment details
This SYSLOG collector needs to be connected to the MoJ_Prod_TGW to receive SYSLOG over udp on port 514 that Atos is planning to send. This SYSLOG collector is a product PaloAlto Cortext XSIAM. This SYSLOG collector is capable of parsing and filtering incoming logs and it will ship collected logs to XSIAM Cloud for analysis and monitoring.
Application Name
Cortex XSIAM Broker
Description of application
This SYSLOG collector needs to be connected to the MoJ_Prod_TGW so that it receives SYSLOG over udp on port 514 that Atos is planning to send. This SYSLOG collector is a product PaloAlto Cortext XSIAM. This SYSLOG collector is capable of parsing and filtering incoming logs and it will ship collected logs to XSIAM Cloud for analysis and monitoring.
Use Cases
MoJ_Prod_TGW:
Cisco AnyConnect devices in ARK to be able to securely transport logs over the SD-WAN / VPN
Future syslogging from non MOJ supported devices in ARK, DMVPN and site LAN to be able to trsnsport the logs securely over the SD-WAN / VPN
MoJ_NOC_TGW:
ARK Management Network to allow any Cisco devices to securely transfer SYSLOGs over unencrypted UDP port 514 via a VPN
102PF to allow any Cisco devices to securely transfer SYSLOGs over unencrypted UDP port 514 via a VPN
MoJ Managed DIA Networks to allow any devices to securely transfer SYSLOGs over unencrypted UDP port 514 via a VPN
GitHub team slug
mip-devops
GitHub code owner team slug
mip-devops
Environments
Environment access level Development
No response
Environment access level Test
No response
Environment access level Preproduction
developer
Environment access level Production
developer
application
Cortex XSIAM Broker
business-unit
HQ
infrastructure-support
mip team: monitoring-and-integration-platform@justice.gov.uk
owner
mip team: monitoring-and-integration-platform@justice.gov.uk
Subnet sets
How do users connect to the application
With a MoJ Official device
Additional features
Please check any additional features required
Other information
No response
Definition of Done
Definition of Done
The text was updated successfully, but these errors were encountered: