AWS EKS Data Connector (via Codeless Connector Framework)

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index


Attribute Value
Connector ID AWSEKSDefinition
Publisher Amazon Web Services
Used in Solutions AWS EKS
Collection Method CCF
Connector Definition Files AWSEKS_ConnectorDefinition.json
CCF Configuration AWSEKS_PollingConfig.json
CCF Capabilities AmazonWebServicesS3

The AWS EKS data connector provides the capability to ingest audit logs from Amazon Elastic Kubernetes Service into Microsoft Sentinel. This connector focuses on EKS audit logs (JSON format) which contain detailed information about API server requests, authentication decisions, and cluster activities. The connector uses AWS SQS to receive notifications when new audit log files are exported to S3, ensuring real-time security monitoring and compliance tracking for your Kubernetes clusters.

Tables Ingested

This connector ingests data into the following tables:

Table Transformations Ingestion API Lake-Only
AWSEKSLogs_CL ? ?

💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.

Permissions

Resource Provider Permissions: - Workspace (Workspace): Read and Write permissions are required.

Setup Instructions

⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.

1. AWS CloudFormation Deployment

Use the provided CloudFormation templates to configure the AWS environment for sending logs from AWS EKS to your Log Analytics Workspace.

Deploy CloudFormation Templates in AWS:

  1. Navigate to the AWS CloudFormation Stacks.
  2. Click Create stack and select With new resources.
  3. Choose Upload a template file, then click Choose file to upload the appropriate CloudFormation template(Template 1 and 2 below) provided.
  4. Follow the prompts and click Next to complete the stack creation.
  5. After the stacks are created, navigation to the Outputs section. Run the scripts in step 1 and 2 from the output section, it stream log from eks to sqs.
  6. In the same outputs section, Note down the Role ARN and SQS Queue URL which are going to be used in connect connector.

2. Connect new collectors

To enable AWS Security Hub Connector for Microsoft Sentinel, click the Add new collector button, fill the required information in the context pane and click on Connect. - SentinelRoleArn: The AWS IAM Role ARN for cross-account access (e.g., arn:aws:iam::123456789012:role/SentinelRole) - SentinelSQSQueueURL: The full AWS EKS queue URL (e.g., https://sqs.region.amazonaws.com/account-id/queue-name)

3. Connect

Enable the AWS EKS connector. - Click 'Connect' to establish connection


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Connectors Index