Docker is an open-source platform used to automate the management, deployment, and scaling of applications inside packages called containers. Panther can collect, normalize, and monitor Docker logs to provide complete visibility to your security team over Docker system-level events. Your normalized data is then retained to power future security investigations in a serverless data lake powered by Snowflake.
Panther offers native support for Docker Event logs, which capture system-level events relating to operations performed on containers, images, networks, volumes, and more. Common SIEM use cases for Docker logs include monitoring for:
Panther’s integration for Docker is easy to configure, allowing you to onboard your event logs in just a few minutes. You can simply select Docker Events from the list of log sources in the Panther console, and then configure a Fluent Bit file to forward your logs into Panther via an HTTP source.
For more detailed steps on onboarding Docker logs or for supported log schema, you can view our Docker documentation here.
As Panther ingests Docker logs, they are parsed, normalized, and stored in a Snowflake security data lake. This empowers security teams to craft detections, identify anomalies, and conduct investigations on your data in the context of days, weeks, or months.
Panther’s managed schema will apply normalization fields to your Docker logs, which standardize names for attributes and empower users to correlate and investigate data across all log types. For more on searching log data in Panther, check out our documentation on Investigations & Search.
With Panther, your team won’t be confined to rigid detection rules as seen in many SIEM platforms. Panther is built with detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering workflows. This results in powerful, flexible, and reusable scripting of detections for your security team.
Panther fires alerts when your detection rules or policies are triggered, and integrates with a variety of alert destinations to allow for easy access and management of any Docker alerts. Alerts can also be forwarded to alert context or SOAR platforms for more remediation options.
Alerts are categorized in five different severity levels: Info, Low, Medium, High, and Critical. Security teams have the options to dynamically assign severity based on specific log event attributes.
If you have any questions about configuring or monitoring Docker logs in Panther, we’re here to help. All customers have access to our technical support team via a dedicated Slack channel, email, or in-app messenger.
You can view our documentation on configuring and monitoring Docker logs here, or customers can sign up for the Panther Community to share best practices or custom detections for monitoring Docker.
With Panther, security teams don’t have to struggle with restrictive detection logic, waste time and resources on operational overhead, or pay skyrocketing costs to keep up with the growth of their organization’s data. Panther was founded by a team of veteran security practitioners who struggled with legacy SIEM challenges first-hand, and built an intuitive, cloud-native platform to solve them.
Panther is a cloud-native SIEM built for security operations at scale, offering flexible detection-as-code, intuitive security workflows, and actionable real-time alerts to keep up with the needs of today’s security teams. For a powerful, flexible, and scalable SIEM solution for Docker, request a demo today.