Step 2: Connect Your First Data Source using Scanner Collect
Option A: Direct from the log source using Scanner Collect (Recommended for New Data)
Pre-built integrations for popular sources like GitHub, Crowdstrike, Okta, and more.
Navigate to the Collect tab
For your first source follow the prompt on the landing page. Otherwise if you have existing sources - from the 'Overview' or 'Collect Rules' tab click the '+' in the upper right hand corner to create a new rule
Select a data source from available integrations
Configure source settings (API credentials, transformations, etc.)
Select the destination S3 bucket in your account for raw logs
When you have created the Collect Rule continue to create an Index Rule so Scanner processes logs for search and detection
See Scanner Collect for detailed integration guides.
Option B: Direct S3 Indexing (For Logs already in S3)
Configure Scanner to index logs already stored in your S3 buckets.
Navigate to the Collect tab
Navigate to the "AWS S3 -> Scanner" > Index Rules Tab
For your first source follow the prompt on the landing page. Otherwise if you have existing sources click the '+" icon in the upper right hand corner to create a new Index Rule
Configure:
Destination Index: Choose main or create a new index (e.g., cloudtrail)
Import Source: Select your linked AWS account and S3 bucket
S3 Key Prefix: (Optional) Specify folder path if logs are in a subfolder
File Format: JSON, JSON Lines, CSV, or Parquet
Compression: None, GZIP, etc.
Timestamp Field: Field name containing event timestamp (e.g., eventTime for CloudTrail)
Click Preview Rule to verify Scanner can parse your files
Save the rule
Scanner will automatically begin indexing new files as they arrive.
Last updated
Was this helpful?