The Secure60 Portal provides a modern, intuitive interface for managing your Secure60 Collector configuration. This portal-based approach is the recommended method for configuring collectors, as it allows you to manage all aspects of collector configuration directly through the web interface without needing to edit .env files or configuration files manually.
With portal-based configuration, you can:
Create and manage Collector Groups
Generate .env files automatically
Configure Collector Profiles that contain Log Parsers
Build Log Parsers to extract valuable context from your logs
Leverage automated Log Pattern detection for intelligent log enrichment
Manage all configuration through the portal UI
Advanced Configuration Options
While the portal provides comprehensive configuration management, advanced features and custom scenarios may still require manual configuration. For these cases, see the Manual Configuration documentation.
Workflow Overview
The portal-based collector configuration follows this workflow:
Create a Collector Group - Organize your collectors into named groups
Generate Configuration - Automatically generate .env files for deployment
Create Collector Profiles - Define profiles that contain one or more Log Parsers
Build Log Parsers - Create parsers to match log types and extract valuable context
Leverage Log Patterns - Use automated pattern detection to build parsers intelligently
Creating Collector Groups
Collector Groups allow you to organize and manage multiple collectors together. This is the starting point for portal-based configuration.
Step 1: Navigate to Collectors
Log in to your Secure60 Portal
Navigate to Integrations → Secure60 Collector → Collectors
Step 2: Create a New Collector Group
Click the “New Collector Group” button
Enter a descriptive name for your collector group (e.g., “Production Web Servers”, “Network Devices”, “Application Logs”)
The system will generate a unique identifier for this group
Step 3: Generate Configuration File
Once you’ve created a collector group, you can generate a .env file that contains all the necessary configuration:
Select your collector group from the list
Click to view the group details
Generate or download the .env file
The generated .env file will include:
Your Project ID
Ingest token
Collector group identifier
Any configured profiles and parsers
Step 4: Deploy the Collector
Use the generated .env file to deploy your Secure60 Collector:
Configured Collectors: Collector groups that have been set up and are actively sending data
Unknown Collectors: Collectors that are sending data but haven’t been assigned to a group yet
You can:
Click on any configured collector group to view details and assign profiles
Update unknown collectors by assigning them to the correct group name
Monitor event rates and last seen timestamps
Delete collector groups when no longer needed
Collector Profiles
Collector Profiles are containers that hold one or more Log Parsers. They allow you to organize parsers logically and apply them to specific collector groups.
Creating a Collector Profile
Navigate to Integrations → Secure60 Collector → Collector Profiles
Click “New Profile” or “Add Item”
Enter a descriptive name for your profile (e.g., “Cisco ASA Logs”, “Web Application Logs”, “Authentication Events”)
Optionally, provide a value identifier for the profile
Assigning Log Parsers to Profiles
Select a profile from the list
Add Log Parsers to the profile by:
Creating new parsers directly in the profile
Assigning existing parsers to the profile
Configure the order in which parsers are applied (if multiple parsers are in the profile)
Assigning Profiles to Collector Groups
Navigate to Collectors
Click on a collector group to view its details
Assign one or more profiles to the group
The collectors in that group will automatically use the parsers defined in the assigned profiles
Log Parsers
Log Parsers are objects that match specific log types and extract valuable context from log messages. They are essential for understanding security contexts and enabling effective analysis.
Purpose of Log Parsers
Log Parsers serve several critical functions:
Log Type Matching: Identify and categorize different types of logs (e.g., authentication logs, network logs, application logs)
Context Extraction: Extract important fields from unstructured log messages, such as:
Usernames
IP addresses
Login success/failure status
Event types
Timestamps
Error codes
And many other security-relevant fields
Field Enrichment: Add structured fields to events for better searchability and analysis
Normalization: Standardize field names and formats across different log sources
Example Use Cases
Authentication Logs:
Extract username, source IP, login success/failure status, and timestamp from authentication events
Enable detection of brute force attacks, account compromises, and unauthorized access attempts
Network Device Logs:
Extract source/destination IPs, ports, protocols, and connection status from firewall and router logs
Enable network traffic analysis and threat detection
Application Logs:
Extract user actions, error codes, transaction IDs, and performance metrics
Enable application security monitoring and operational insights
Creating Log Parsers
There are three main ways to create Log Parsers in the portal:
Method 1: From Log Patterns (Recommended)
This is the most automated approach, leveraging pattern detection:
Navigate to Integrations → Secure60 Collector → Log Patterns
Review detected patterns (requires the log pattern detector container to be deployed)
Select a pattern that matches the log type you want to parse
Use the interactive parser builder to:
Click on parts of the pattern (especially <*> wildcards) to extract them as fields
Define field names for extracted values
Set conditions for when the parser should apply
Add static fields if needed
Review the generated VRL (Vector Remap Language) code
Save the parser to a Collector Profile
Method 2: From Search Results
You can build parsers directly from log data you’re viewing:
Navigate to the Search page in the Secure60 Portal
Find log events that represent the log type you want to parse
Expand a row to view the full log message
Highlight text in the log message that you want to extract
Use the context menu to “Add to Parser” or “Build Parser”
Follow the parser builder workflow to create the parser
Method 3: Manual Parser Creation
For advanced users or custom scenarios:
Navigate to Integrations → Secure60 Collector → Log Parsers
Click “Add Item” or “New Parser”
Configure:
Parser Name: A descriptive name for the parser
Parser Value: An optional identifier
Conditions: When the parser should apply (e.g., when source_name equals cisco_asa)
VRL Code: Write or edit Vector Remap Language code to define parsing logic
Save the parser to a Collector Profile
Parser Configuration
Each Log Parser consists of:
Item Name: A unique identifier for this specific parser rule
Conditions: Rules that determine when the parser applies (e.g., when field source_name is cisco_asa)
VRL Code: The actual parsing logic written in Vector Remap Language
Uses functions like parse_regex!() to extract fields using regular expressions
Can merge extracted fields into the event
Can add static fields or transform data
Example Parser
Here’s an example of a Log Parser for Cisco ASA “Teardown” logs:
Extracts the source IP address from “Teardown” log messages
Adds a vendor field set to “cisco”
Log Patterns
Log Patterns represent automated detection of common log structures. This feature enables state-of-the-art automated log enrichment by identifying patterns in your log data and allowing you to build parsers from them.
How Log Patterns Work
Pattern Detection: The log pattern detector container (deployed separately) analyzes incoming log data
Pattern Identification: Common structures are identified and normalized into patterns with wildcards (<*>) representing variable fields
Pattern Review: You can review detected patterns in the Log Patterns page
Parser Building: Select a pattern and use the interactive builder to extract fields and create parsers
The <*> symbols indicate fields that vary between log entries. You can:
Click on <*> positions to define them as extractable fields
Name the fields (e.g., timestamp, log_level, client_ip)
Build a parser that automatically extracts these fields from matching logs
Interactive Parser Builder
When working with Log Patterns, the portal provides an interactive parser builder:
Pattern Display: The detected pattern is shown with clickable elements
Field Selection: Click on <*> wildcards to mark them for extraction
Field Naming: Provide meaningful names for extracted fields
Condition Configuration: Set when the parser should apply (e.g., “Always” or based on specific field values)
VRL Generation: The system automatically generates VRL code based on your selections
Static Fields: Optionally add static key-value pairs to all parsed events
Target Parser: Choose to add to an existing parser or create a new one
Deploying the Log Pattern Detector
The log pattern detector is a separate container that must be deployed alongside your collector. Documentation for deploying and configuring the log pattern detector will be available separately.
Log Pattern Detector
Documentation for deploying and configuring the log pattern detector container is being prepared and will be available soon. Contact integrations@secure60.io for assistance with pattern detector deployment.
Search Integration
The Secure60 Portal’s Search page integrates with the parser creation workflow, allowing you to build parsers directly from real log data.
Building Parsers from Search
Navigate to the Search page
Query for logs that represent the type you want to parse
Expand a log row to view the full message
Highlight text in the log message that you want to extract as a field
Use the context menu or action button to:
“Add to Parser” - Add the highlighted text to an existing parser
“Build Parser” - Create a new parser starting with this extraction
Follow the parser builder workflow to complete the parser configuration
This approach is particularly useful when:
You have specific log examples you want to parse
You need to extract fields that aren’t easily identified by pattern detection
You want to verify parser behavior against real data before deploying
Configuration Management
Portal-Based Configuration Benefits
Using the portal for collector configuration provides several advantages:
No File Editing: Manage all configuration through the web interface
Automatic Synchronization: Configuration changes are automatically synchronized to collectors
Version Control: Track changes and configurations over time
Visual Management: See all your collectors, profiles, and parsers in one place
Easy Updates: Modify parsers and profiles without redeploying collectors
Collaboration: Multiple team members can manage configuration through the portal
Configuration Workflow
The recommended workflow is:
Initial Setup: Create collector groups and generate .env files
Deploy Collectors: Use the generated .env files to deploy collectors
Monitor Unknown Collectors: Review unknown collectors and assign them to groups
Create Profiles: Build profiles for different log types or environments
Build Parsers: Create parsers using Log Patterns, Search, or manual creation
Assign Profiles: Link profiles to collector groups
Iterate: Refine parsers and profiles as you learn more about your log data
Advanced Configuration
For advanced features not yet available in the portal UI, you can still:
Edit .env files directly for environment variable configuration
Use YAML configuration files for custom transformations