Integrations - Configuring AWS S3 to Send Avanan Logs

Step-1:
  • Go to AWS IAM: https://console.aws.amazon.com/iam/home#/home
  • Note: The AWS configuration is similar to part 1, but the Splunk AWS app requires way more permissions that Avanan. Therefore, to limit Avanan’s access to your S3 environment, you’ll need to create a new user, group, policy, and role to use on Splunk.

 

Step-2:
  • Click on Users > Add user

 

Step-3:
  • Select a name and enable “Programmatic access”, click “Next: Permissions”

 

Step-4:
  • Click on “Create group” (or the right group if already created)

 

Step-5:
  • On the new tab, click on JSON and copy this over:

 

  • For example:

 

Step-6:
  • Click on Review Policy
  • On the next screen, select a policy name and click on Create Policy:

 

Step-7:
  • After the policy is created, go back to the previous tab and click Refresh.
  • Select the policy you just created, give the group a name and click on Create group.

 

Step-8:
  • Back to the “Add user” screen, confirm that the group you just created is selected and click on “Next: Tags”

 

Step-9:
  • Add the necessary Tags (in accordance with your environment directives) and click on “Next: Review”
  • Confirm all the configurations and click on “Create user”

 

  • Download the CSV or copy the Access Key and Secret access key somewhere safe.
  • It will be used to configure Splunk. This information won’t be available again.
  • Close.

 

Step-10:
  • Click on Roles and on “Create role”
  • Select Another AWS Account
  • Insert the 12 digit number of your account and click on “Next: Permissions”

 

  • Note: to find the 12 digit number, open the user on another screen:

 

Step-11:
  • Select the policy you created, click on Next: Tags

 

Step-12:
  • Add the necessary Tags (in accordance with your environment directives) and click on “Next: Review”
  • Select a role name and click on Create Role

 

Step-13:
  • Search for the role you just created, click on its name.

 

Step-14:
  • Copy the role ARN

 

Step-15:
  • Now on Splunk, install the AWS add-on if you haven’t already, by clicking on the big + and searching for it:

 

Step-16:
  • Click on Open App after it is installed, or on Splunk Add-on for AWS on the main screen

 

Step-17:
  • Click on Configuration > Account > Add and configure it with the Key ID and Secret Key from the CSV you served when the user was created, click on Add:

 

Step-18:
  • Click on IAM Role > Add and configure it with the Role ARN you copied previously.

 

Step-19:
  • Click on Inputs > Create New Input > Custom Data Type > Generic S3

 

Step-20:
  • Select a name for the Input, the AWS Account and the Assume Role you configured above, the S3 Bucket Avanan is uploading the logs, a start datetime (ideally, a few minutes before you enabled Splunk on Avanan as part of Part 1).
  • Click on the arrow to show the Advanced Settings and set the Polling Interval to 300 s (5 minutes) as Avanan will upload the logs every 5 minutes.
  • Note: We also upload the logs every time they reach 5 MB before 5 minutes (unlikely).
  • Click Save.

 

The Splunk logs are now being read from the S3 bucket where Avanan is uploading them.