Skip to main content

Cloudflare Integration

Introduction 

Cloudflare integration uses Cloudflare's API to retrieve audit logs and traffic logs from Cloudflare, for a particular zone, and ingest them into Elasticsearch. This allows you to search, observe and visualize the Cloudflare log events through Elasticsearch. 

Users of Cloudflare use Cloudflare services to increase the security and performance of their web sites and services. 

To enable the Cloudflare Logpush, please refer to Section 5. Currently, the procedures described is for the setup of Amazon S3.  


Assumptions 

The procedures described in Section 3 assumes that a Log Collector has already been setup 


Requirements 

Configure Cloudflare audit logs data stream 

Enter values "Auth Email", "Auth Key" and "Account ID". 

      1. Auth Email is the email address associated with your account. 

      2. Auth Key is the API key generated on the "My Account" page. 

      3. Account ID can be found on the Cloudflare dashboard. Follow the navigation documentation from here. 


Configure Cloudflare logs 

These logs contain data related to the connecting client, the request path through the Cloudflare network, and the response from the origin web server. For more information see here. 

The integration can retrieve Cloudflare logs using - 

      1. Auth Email and Auth Key 

      2. API Token More information is available here. 


CONFIGURE USING AUTH EMAIL AND AUTH KEY 

Enter values "Auth Email", "Auth Key" and "Zone ID". 

      1. Auth Email is the email address associated with your account. 
      2. Auth Key is the API key generated on the "My Account" page. 
      3. Zone ID can be found here. 

CONFIGURE USING API TOKEN 

Enter values "API Token" and "Zone ID". 

For the Cloudflare integration to be able to successfully get logs the following permissions must be granted to the API token - 

  • Account.Access: Audit Logs: Read 

      1. API Tokens allow for more granular permission settings. 
      2. Zone ID can be found here. 

 

Logs 

Audit 

Audit logs summarize the history of changes made within your Cloudflare account. Audit logs include account-level actions like login and logout, as well as setting changes to DNS, Crypto, Firewall, Speed, Caching, Page Rules, Network, and Traffic features, etc. 

Logpull 

These logs contain data related to the connecting client, the request path through the Cloudflare network, and the response from the origin web server. 


Cloudflare IntegrationProcedures 


 Please provide the following information to CyTech: 

 

See the Screenshot Below 

Token template overview screen 

 

Token summary screen displaying the resources and permissions selected 

Token creation completion screen displaying your API token and the <code>curl</code> command to test your token 

 

 


Audit Logs 

  1. Auth Email  

  1. Auth Key  

  1. Account ID 

Cloudflare Logs 

  1. Auth Token  

  1. Zone ID  

Enable Logpush to Amazon S3 

To enable the Cloudflare Logpush service: 

  1. Log in to the Cloudflare dashboard. 

  1. Select the Enterprise account or domain you want to use with Logpush. 

  1. Go to Analytics & Logs > Logs. 

  1. Select Add Logpush job. A modal window opens where you will need to complete several steps. 

  1. Select the dataset you want to push to a storage service. 

  1. Select the data fields to include in your logs. Add or remove fields later by modifying your settings in Logs > Logpush. 

  1. Select Amazon S3. 

  1. Enter or select the following destination information: 

      • Bucket path 

      • Daily subfolders 

      • Bucket region 

      • Encryption constraint in bucket policy 

      • For Grant Cloudflare access to upload files to your bucket, make sure your bucket has a policy (if you did not add it already): 

      • Copy the JSON policy, then go to your bucket in the Amazon S3 console and paste the policy in Permissions > Bucket Policy and click Save. 

  1. Click Validate access. 

  1. Enter the Ownership token (included in a file or log Cloudflare sends to your provider) and click Prove ownership. To find the ownership token, click the Open button in the Overview tab of the ownership challenge file. 

  1. Click Save and Start Pushing to finish enabling Logpush. 

Once connected, Cloudflare lists Amazon S3 as a connected service under Logs > Logpush. Edit or remove connected services from here.