Overview
Meter’s SIEM integration enables real-time export of network security events from your Meter infrastructure to your organization’s security monitoring and analysis tools. This integration uses AWS Kinesis Data Streams to deliver intrusion detection system (IDS) events in CloudEvents format, allowing you to incorporate Meter network telemetry into your existing security operations workflow.Use cases
- Centralize security event monitoring across your entire technology stack in a single SIEM platform
- Enable custom alerting and correlation rules based on network-level security events
- Meet compliance requirements for security event logging and retention
- Build custom analytics and dashboards for network security insights
- Integrate Meter security detections with incident response automation
Prerequisites
- AWS account with permissions to create and manage Kinesis streams and IAM roles
- Meter Dashboard access with SIEM integration permissions
- Basic understanding of AWS IAM cross-account role assumption
- Familiarity with JSON data processing and CloudEvents specification
Event schema
Events are formatted according to the CloudEvents v1.0 specification with Meter-specific data payloads.CloudEvents envelope
Field | Description |
---|---|
specversion | CloudEvents specification version (always 1.0 ) |
id | Deterministic UUIDv5 based on network UUID, device UUID, and timestamp |
source | Event origin (always https://meter.com ) |
type | Event type identifier (always com.meter.ids.detection ) |
subject | Network UUID that generated the event |
datacontenttype | Content type of the data field (always application/json ) |
time | ISO 8601 timestamp when the event was observed |
data | IDS event details (see below) |
IDS event data structure
Thedata
field contains detailed information about the security event:
Data field reference
Field | Type | Description |
---|---|---|
src_ip | string | Source IP address of the flow |
src_port | uint32 | Source port number |
dest_ip | string | Destination IP address |
dest_port | uint32 | Destination port number |
src_mac | string | Source MAC address |
dst_mac | string | Destination MAC address |
flow_id | uint64 | Unique identifier for the network flow |
app_proto | string | Application layer protocol (e.g., http , tls , dns ) |
protocol | string | Transport protocol enum: IANA_PROTOCOL_TCP , IANA_PROTOCOL_UDP , IANA_PROTOCOL_ICMP , IANA_PROTOCOL_ESP , IANA_PROTOCOL_AH , IANA_PROTOCOL_ANY |
direction | string | Flow direction: DIRECTION_TO_SERVER or DIRECTION_TO_CLIENT |
type | string | Detection type: TYPE_IDS (passive detection), TYPE_OOB_PROTECT (out-of-band firewall), TYPE_IB_PROTECT (inline IPS) |
Alert object
Field | Type | Description |
---|---|---|
action | string | Action taken: ACTION_ALLOWED , ACTION_BLOCKED |
gid | uint32 | Generator ID from the rule |
sid | uint32 | Signature ID from the rule |
rev | uint32 | Rule revision number |
signature | string | Human-readable alert signature |
category | string | Alert category description |
severity | uint32 | Severity level (1=high, 2=medium, 3=low) |
HTTP object (when applicable)
Field | Type | Description |
---|---|---|
hostname | string | HTTP Host header value |
url | string | Request URL path |
user_agent | string | User-Agent header |
method | string | HTTP method (GET, POST, etc.) |
protocol | string | HTTP protocol version |
status | uint32 | HTTP response status code |
content_type | string | Content-Type header |
length | string | Content length in bytes |
Flow object
Field | Type | Description |
---|---|---|
pkts_toserver | string | Packet count to server |
pkts_toclient | string | Packet count to client |
bytes_toserver | string | Byte count to server |
bytes_toclient | string | Byte count to client |
reason | string | Flow termination reason |
Best practices
Performance optimization
- Kinesis shard capacity: Ensure your Kinesis stream has adequate shard capacity. Each shard supports 1 MB/sec or 1,000 records/sec. Monitor the
IncomingBytes
andIncomingRecords
CloudWatch metrics. - Consumer scaling: If processing events with AWS Lambda or other consumers, ensure they can handle the event rate during peak traffic periods.
- Data retention: Configure appropriate retention periods on your Kinesis stream (default 24 hours, maximum 365 days).
Related resources
- Configuring SIEM integration in Dashboard
- Terraform configuration examples
- AWS Kinesis Data Streams documentation
- CloudEvents specification