Hanzo
PlatformHanzo KMSPlatformAudit Log Streams

Audit Log Streams

Learn how to stream Hanzo KMS Audit Logs to external logging providers.

Audit log streams is a paid feature.

Hanzo KMS Audit Log Streaming enables you to transmit your organization's audit logs to external logging providers for monitoring and analysis.

Overview

  1. Navigate to Organization Settings
  2. Select the Audit Log Streams tab
  3. Click Add Log Stream

stream create

If your log provider is included in this list, select it. Otherwise click on Custom to input your own Endpoint URL and headers.

select provider

Depending on your chosen provider, you'll be asked to input different credentials.

For Custom, you need to input an endpoint URL and headers.

custom provider

Once you're finished, click Create Log Stream.

Your audit logs are now ready to be streamed.

stream list

Example Providers

Hanzo KMS offers a dedicated Azure provider to stream your audit logs, enabling seamless integration with services like Microsoft Sentinel.

After setting up all Azure resources, it may take 10-20 minutes for logs to begin streaming.

Navigate to Data Collection Endpoints and click Create.

azure create dce

Configure your Data Collection Endpoint by providing an Endpoint Name, Subscription, and a Resource group. Then click Review + Create.

azure configure dce

After creation, it may take a few minutes for the Data Collection Endpoint to appear. Once visible, click on it and copy the Logs Ingestion URL. You will need this URL in later steps.

azure dce url

If you already have a Log Analytics Workspace, you may skip this step.

Navigate to Log Analytics Workspaces and click Create.

azure create law

Configure your Log Analytics Workspace by providing a Subscription, Resource group, and a Name. Then click Review + Create.

azure configure law

Once the workspace is deployed, click Go to resource to access it.

azure go to resource

Within your Log Analytics Workspace, navigate to Tables and click Create. Select New custom log (DCR-based) from the dropdown.

azure new table

Configure the Custom Log Table: Provide a Table name (e.g., Hanzo KMSLogs), select the Data collection endpoint created in Step 1, and create a new Data collection rule as illustrated in the image below. Then, click Next.

azure configure table

On the Schema and transformation page, you'll be prompted to upload a Log Sample. Create a .json file with the following content and upload it:

{
"id": "00000000-0000-0000-0000-000000000000",
"actor": "user",
"actorMetadata": {
    "email": "user@example.com",
    "userId": "00000000-0000-0000-0000-000000000000",
    "username": "user@example.com"
},
"ipAddress": "0.0.0.0",
"userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/139.0.0.0 Safari/537.36",
"userAgentType": "web",
"eventType": "get-secrets",
"eventMetadata": {},
"projectName": "MyProject",
"orgId": "00000000-0000-0000-0000-000000000000",
"projectId": "00000000-0000-0000-0000-000000000000",
"TimeGenerated": "2025-01-01T00:00:00.000Z"
}

Optionally, you can add Transformations to further destructure the data. For example, to extract actor email and userId:

source
| extend
    ActorEmail = tostring(actorMetadata.email),
    ActorUserId = tostring(actorMetadata.userId)

On the final step, click Create.

It may take a few minutes for your Custom Log Table to be created and appear under Tables.

After creating your Data Collection Rule, you'll need its Immutable ID.

Navigate to Data collection rules. Click on your newly created DCR and copy its Immutable ID for the next step.

azure dcr

In Hanzo KMS, create a new audit log stream and select the Azure provider. Input the following details:

  • Tenant ID: Your Tenant ID
  • Client ID: The Client ID of an App Registration
  • Client Secret: The Client Secret of an App Registration
  • Data Collection Endpoint URL: Obtained from Step 1
  • Data Collection Rule Immutable ID: Obtained from Step 4
  • Custom Log Table Name: Defined in Step 3

azure create als

The App Registration used for authentication must have the Monitoring Metrics Publisher role assigned on the Data Collection Rule created in Step 3. See Microsoft Guide.

You can stream to Better Stack using a Custom log stream.

On Better Stack, select Connect Source and click Create source after providing a name.

better stack connect source

Once your source is created, take note of the endpoint and Source token for the next step.

better stack connect

On Hanzo KMS, create a new audit log stream and select the Custom option.

select custom

  1. Fill in the endpoint URL with your Better Stack source endpoint
  2. Create a new header with key Authorization and set the value as Bearer <betterstack-src-token>

custom provider

Once you're finished, click Create Log Stream.

Stream Hanzo KMS audit logs to Cribl Stream for centralized processing and routing. Hanzo KMS supports Cribl as a provider for seamless integration.

In Cribl Stream, navigate to Worker Groups and select your Worker Group. Take note of the Ingress Address for later steps.

cribl ingress address

Within your Worker Group, navigate to Data > Sources > HTTP and click Add Source.

cribl add source

Configure the Input ID, Port, and Cribl HTTP event API path (e.g., /kms). Then, generate an Auth Token.

You can optionally configure TLS in the TLS Settings tab and add a pipeline in the Pre-Processing tab.

Ensure that you're using a port that's open on your instance.

cribl general settings

Once you've configured the Data Source, click Save and deploy your changes.

On Hanzo KMS, create a new audit log stream and select the Cribl provider option.

Input the following credentials:

  • Cribl Stream URL: Your HTTP source endpoint composed of http://<ingress-address>:<port>/<http-event-api-path>/_bulk
  • Cribl Stream Token: The authentication token from Step 1

If you configured TLS for your Data Source, use the https:// protocol.

cribl details

Once you're finished, click Create Log Stream.

You can stream to Datadog using the Datadog provider log stream.

api key create

api key form api key form

On Hanzo KMS, create a new audit log stream and select the Datadog provider option.

Input your Datadog Region and the Token obtained from step 2.

datadog details

Once you're finished, click Create Log Stream.

You can stream to Splunk using the Splunk provider log stream.

Navigate to Settings > Data Inputs.

splunk data inputs

Click on HTTP Event Collector.

splunk http collector

Click on New Token in the top left.

splunk new token

Provide a name and click Next.

splunk name

On the next page, click Review and then Submit at the top. On the final page you'll see your token.

Copy the Token Value and your Splunk hostname from the URL to be used for later.

splunk credentials

On Hanzo KMS, create a new audit log stream and select the Splunk provider option.

Input your Splunk Hostname and the Token obtained from step 1.

splunk details

Once you're finished, click Create Log Stream.

Example Log Entry

{
  "id": "7dc1713b-d787-4147-9e21-770be01cc992",
  "actor": "user",
  "actorMetadata": {
    "email": "example@kms.hanzo.ai",
    "userId": "7383b701-d83f-45c0-acb4-04e138b987ab",
    "username": "example@kms.hanzo.ai"
  },
  "ipAddress": "127.0.0.1",
  "eventType": "create-secret",
  "eventMetadata": {
    "secretId": "3e5c796e-6599-4181-8dca-51133bb3acd0",
    "secretKey": "TEST-SECRET",
    "secretPath": "/",
    "environment": "dev",
    "secretVersion": 1
  },
  "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36",
  "userAgentType": "web",
  "expiresAt": "2025-01-18T01:11:25.552Z",
  "createdAt": "2025-01-15T01:11:25.552Z",
  "updatedAt": "2025-01-15T01:11:25.552Z",
  "orgId": "785649f1-ff4b-4ef9-a40a-9b9878e46e57",
  "projectId": "09bfcc01-0917-4bea-9c7a-2d320584d5b1",
  "projectName": "example-project"
}

Audit Logs Structure

Streamed audit log structure varies based on provider, but they all share the audit log fields shown below.

The unique identifier for the log entry.

The entity responsible for performing or causing the event; this can be a user or service.

The metadata associated with the actor. This varies based on the actor type.

This metadata is present when the actor field is set to user.

The unique identifier for the actor.

The email address of the actor.

The username of the actor.

This metadata is present when the actor field is set to identity.

The unique identifier for the identity.

The name of the identity.

This metadata is present when the actor field is set to service.

The unique identifier for the service.

The name of the service.

If the actor field is set to platform, scimClient, or unknownUser, the actorMetadata field will be an empty object.

The IP address of the actor.

The type of event that occurred. Below you can see a list of possible event types. More event types will be added in the future as we expand our audit logs further.

get-secrets, delete-secrets, get-secret, create-secret, update-secret, delete-secret, get-workspace-key, authorize-integration, update-integration-auth, unauthorize-integration, create-integration, delete-integration, add-trusted-ip, update-trusted-ip, delete-trusted-ip, create-service-token, delete-service-token, create-identity, update-identity, delete-identity, login-identity-universal-auth, add-identity-universal-auth, update-identity-universal-auth, get-identity-universal-auth, create-identity-universal-auth-client-secret, revoke-identity-universal-auth-client-secret, get-identity-universal-auth-client-secret, create-environment, update-environment, delete-environment, add-workspace-member, remove-workspace-member, create-folder, update-folder, delete-folder, create-webhook, update-webhook-status, delete-webhook, webhook-triggered, get-secret-imports, create-secret-import, update-secret-import, delete-secret-import, update-user-workspace-role, update-user-workspace-denied-permissions, create-certificate-authority, get-certificate-authority, update-certificate-authority, delete-certificate-authority, get-certificate-authority-csr, get-certificate-authority-cert, sign-intermediate, import-certificate-authority-cert, get-certificate-authority-crl, issue-cert, get-cert, delete-cert, revoke-cert, get-cert-body, create-pki-alert, get-pki-alert, update-pki-alert, delete-pki-alert, create-pki-collection, get-pki-collection, update-pki-collection, delete-pki-collection, get-pki-collection-items, add-pki-collection-item, delete-pki-collection-item, org-admin-accessed-project, create-certificate-template, update-certificate-template, delete-certificate-template, get-certificate-template, create-certificate-template-est-config, update-certificate-template-est-config, get-certificate-template-est-config, update-project-slack-config, get-project-slack-config, integration-synced, create-shared-secret, delete-shared-secret, read-shared-secret.

The metadata associated with the event. This varies based on the event type.

The user agent of the actor, if applicable.

The type of user agent.

The expiration date of the log entry. When this date is reached, the log entry will be deleted from Hanzo KMS.

The creation date of the log entry.

The last update date of the log entry. This is unlikely to be out of sync with the createdAt field, as we do not update log entries after they've been created.

The unique identifier for the organization where the event occurred.

The unique identifier for the project where the event occurred.

The projectId field will only be present if the event occurred at the project level, not the organization level.

The name of the project where the event occurred.

The projectName field will only be present if the event occurred at the project level, not the organization level.

How is this guide?

Last updated on

On this page