Uredi

Deli z drugimi prek


Configure automatic log upload using Podman

Note

Microsoft Defender for Cloud Apps is now part of Microsoft Defender XDR, which correlates signals from across the Microsoft Defender suite and provides incident-level detection, investigation, and powerful response capabilities. For more information, see Microsoft Defender for Cloud Apps in Microsoft Defender XDR.

This article describes how to configure automatic log upload for continuous reports in Defender for Cloud Apps using a Podman container on Linux in an on-premises server. Customers using RHEL 7.1 or higher must use Podman for automatic log collection.

Prerequisites

Before you start:

  • Make sure you're using a container with RHEL 7.1 and higher.
  • Since Docker and Podman can't coexist on the same machine, make sure to uninstall any Docker installations before running Podman.
  • Make sure that you're signed in to the RHEL machine as user root to deploy Podman

Setup and configuration

  1. Sign into Microsoft Defender XDR and select Settings > Cloud Apps > Cloud Discovery > Automatic log upload.

  2. Make sure that you have a data source defined on the Data sources tab. If you don't, select Add a data source to add one.

  3. Select the Log collectors tab, which lists all the log collectors deployed on your tenant.

  4. Select the Add log collector link. Then, in the Create log collector dialog enter:

    Field Description
    Name Enter a meaningful name, based on key information that the log collector uses, such as your internal naming standard or a site location.
    Host IP address or FQDN Enter your log collector's host machine or virtual machine (VM) IP address. Make sure that your syslog service or firewall can access the IP address / FQDN you enter.
    Data source(s) Select the data source you want to use. If you're using multiple data sources, the selected source is applied to a separate port so that the log collector can continue to send data consistently.

    For example, the following list shows examples of data source and port combinations:
    - Palo Alto: 601
    - CheckPoint: 602
    - ZScaler: 603
  5. Select Create to show further instructions on the screen for your specific situation.

  6. Copy the command displayed and modify it as needed based on the container service you're using. For example:

    (echo <key>) | podman run --privileged --name PodmanRun -p 601:601/tcp -p 21:21 -p 20000-20099:20000-20099 -e "PUBLICIP='10.0.2.15'" -e "PROXY=" -e "SYSLOG=true" -e "CONSOLE= <tenant>.us3.portal.cloudappsecurity.com" -e "COLLECTOR=PodmanTest" --security-opt apparmor:unconfined --cap-add=SYS_ADMIN --restart unless-stopped -a stdin -i mcr.microsoft.com/mcas/logcollector starter 
    
  7. Run the modified command on your machine to deploy the container. When successful, the logs show pulling an image from mcr.microsoft.com and continuing to create blobs for the container.

  8. When the container is fully deployed, verify that it's working by checking with the containerization service:

    podman ps
    

Note

Podman containers do not start automatically when the host server is rebooted. Restarting the Podman host machine requires you to start the container again too.

Troubleshooting

If you're not getting firewall logs from your Podman container, check the following:

  1. Make sure that rsyslog rotates on the log collector.

  2. If you've made changes, wait a couple of hours and run the following command to see if anything's changed:

    podman logs <container name>
    

    where <container name> is the name of the container you're using.

  3. If the logs are still not sent, make sure that the container is deployed using the --privileged flag. If you haven't deployed your container with the --privileged flag, the container won't gather uploaded files to the host machine.

For more information, see Configure automatic log upload for continuous reports.