Fluentd is an open-source data collector for unifying various application logs, network protocols, IoT devices, and other data sources. Panther can collect, normalize, and monitor Fluentd logs to help you identify suspicious activity in real time. Your normalized data is then retained to conduct future security investigations in a data lake powered by Snowflake.
Some common SIEM use cases for Fluentd logs include:
Panther’s integration for Fluentd is simple and quick to configure, allowing you to onboard your logs in just a few minutes. Simply select Fluentd from the list of pre-defined log sources, select your preferred data transport method (AWS S3 or SQS), and configure Fluentd to push logs to your data transport source.
For more details on onboarding Fluentd logs or for supported log schema, you can view our Fluentd documentation here.
As Panther ingests Fluentd logs, they are parsed, normalized, and stored in a Snowflake security data lake. This allows you to build detections, identify anomalies, and conduct investigations in the context of days, weeks, or months of data.
Panther applies normalization fields to all log records, which standardizes names for attributes and enables users to correlate data across all of your log sources. Panther’s intuitive search features allow you to conduct investigations for suspicious activity or vulnerabilities. For more information on searching logs, check out our documentation on Investigations & Search.
With Panther, you aren’t confined to restrictive detections or proprietary coding languages as seen in many SIEM solutions. Panther is architected around detection-as-code principles, giving you the ability to write Python to define detection logic and to integrate external systems like version control and CI/CD pipelines into your detection engineering processes. This results in powerful, flexible, and reusable scripting of detection logic for your security team.
Panther generates alerts when your detection rules or policies for Fluentd are triggered, and integrates with a variety of alert destinations to allow for intuitive management of any alerts. Alerts can also be sent to alert context or SOAR platforms for more remediation options.
Alerts are categorized into five severity levels: Info, Low, Medium, High, and Critical. Your security team has the ability to dynamically assign severity based on specific log event attributes.
If you have any questions about configuring or monitoring Fluentd logs in Panther, our support team is here to help. All customers have access to support via a dedicated Slack channel, email, or in-app messenger.
With Panther, your team doesn’t have to waste time and resources on operational overhead, pay excessive costs to keep up with the growth of cloud app data or struggle with limited detection logic. Panther was founded by a team of security engineers who struggled with other SIEM solutions first-hand, and built an intuitive, cloud-native platform to solve them.
Panther is a cloud-native SIEM built for security operations at scale, offering powerful detection-as-code, intuitive security workflows, and actionable real-time alerts. If you’re searching for an ideal SIEM solution for Fluentd, request a demo today.
Gain complete visibility into your operating system activity.
Monitor OSSEC logs to gain complete security visibility into host activity.
Monitor machine and network activity for suspicious behavior.
Monitor your endpoint data, network activity, and DNS requests.
Monitor endpoint activity for suspicious behavior.
Monitor application, system, and security notifications from Windows machines.
Monitor endpoint policy violations and data loss prevention events.
Gain complete visibility into your managed endpoints.