Sorry to hear you are still working on this. When it comes to network issues, I can't help much. Docker should represent itself as the Collector Source IP, from what I've seen. Is there a way your network team can open things up a bit wider until you get it working, then narrow it back down once you're able to see the traffic flow?
Sr. Consultant, Data Protection
Need help with your Guardium deployment? Contact me directly to discuss engagement opportunities. Currently serving North America.
Original Message:
Sent: Thu July 03, 2025 06:32 PM
From: sara rehan
Subject: Universal Connector MariaDB on AWS RDS
Hi Wendy,
We have two troubleshooting calls with IBM but we are not getting anywhere. we have made progress but still not logs.
- we have guardium collector vm on prem
- trying to get to aws rds cloudtwach using IAM role access key credentials and logroup
- vpc endpoint created on aws rds for private connectivity
- firewall rules created to allow traffic from collector soruce ip to vpc endpoint in this case sts
- when run commands from docker container it does not show any connectivity to vpc endpoint
- but when run command outside docker it shows connectivity to vpc endpoint and resolves into private ips
- does it matter if there is no connectivity through docker? can we just ignore it?
- if not then what do we have to do to make docker use host ip to send traffic out of collector to vpc endpoint
Thanks
regards
------------------------------
sara rehan
Original Message:
Sent: Fri June 20, 2025 08:14 AM
From: Wendy Zemba
Subject: Universal Connector MariaDB on AWS RDS
@sara rehan,
At this point, I recommend performing some hands-on troubleshooting. If you haven't already, consider opening a support case for further assistance.
------------------------------
Wendy Zemba
Sr. Consultant, Data Protection
Converge Technology Solutions
wendy.zemba@convergetp.com
Need help with your Guardium deployment? Contact me directly to discuss engagement opportunities. Currently serving North America.
Original Message:
Sent: Thu June 19, 2025 03:54 PM
From: sara rehan
Subject: Universal Connector MariaDB on AWS RDS
Hi,
I have been using simple filter with type =>mysql . Since I don't have full access to CLI, I am limited to what I can check. Network team confirmed that they can see traffic flow form collector to vpc endpoint and back but somehow not pulling logs since access key in aws rds has not been accessed when I run the troubleshooting tool it doesn't give me much information. I'm just not sure why is it not accessing the logs in cloudwatch.
------------------------------
sara rehan
Original Message:
Sent: Mon June 16, 2025 08:58 AM
From: Wendy Zemba
Subject: Universal Connector MariaDB on AWS RDS
Hi @sara rehan,
You need to use the input and filter that matches your DBMS type, in your case MariaDB, correct? Looks like you're using MYSQL.
https://github.com/IBM/universal-connectors/blob/main/filter-plugin/logstash-filter-mariadb-aws-guardium/README.md
Below depicts what you would put in for a MariaDB filter. Note that you need to include the availability zone of your region, I added "a", but you need to confirm. You also need to change the parameters represented by the < >'s (highlighted yellow).
cloudwatch_logs {
log_group => ["/aws/rds/instance/test/postgresql"]
region => "ap-south-1a"
codec => plain
sincedb_path => "NUL"
access_key_id => "<ACCESS_KEY>"
secret_access_key => "<SECRET_ACCESS_KEY>"
type => "mariadb"
event_filter => ''
start_position => "end"
add_field => {"account_id" => "<ACCOUNT_ID>"}
I'm not 100% how it will function if you don't include the filter, but it's easy enough to drop in there. The only thing you would change in it, without direction from support, would be the type. The type parameter in the filter needs to match the type value you enter in to the above input section, in this example "mariadb".
------------------------------
Wendy Zemba
Sr. Consultant, Data Protection
Converge Technology Solutions
wendy.zemba@convergetp.com
Need help with your Guardium deployment? Contact me directly to discuss engagement opportunities. Currently serving North America.
Original Message:
Sent: Sat June 14, 2025 02:54 PM
From: sara rehan
Subject: Universal Connector MariaDB on AWS RDS
Hi Wendy,
Yes so finally we have port 443 opened bi directional . From On prem collector to aws . We had to setup a vpc as well. But I still couldn't see any sessions coming through and aws rds team has confirmed the IAM user created has never been accessed. I am using Logstash Maria db configurations from GitHub to pull logs from cloud watch. Below is the script I'm using
cloudwatch_logs { log_group => [ "/aws/rds/instance/test/postgresql"] start_position => "beginning" access_key_id => "<Enter the access key id>" secret_access_key => "<<Enter the secret access key id>>" region => "ap-south-1" #Default value: us-east-1 interval => 60 codec => null
add_field => {"account_id" => "<ACCOUNT_ID>"}
type => "aws_mysql"
Aws rds using Mariadb plugin but I think logs that are being sent are not JSON logs. I m keeping filter as empty at the moment. But I have not setup any configuration for output. Do I have to do that as well or I can do that later once I start getting sessions?
Thanks for your help.
Regards
Sara
Original Message:
Sent: 5/8/2025 11:29:00 AM
From: sara rehan
Subject: Universal Connector MariaDB on AWS RDS
@Wendy Zemba Thanks for the reply Wendy. I don't see anything under s-tap status. no universal connector. but i have checked it has been enabled and configuration was saved successfully have couple of questions
1.I have not setup any policy for UC , do i have setup a policy first before logs can be pulled from cloudwatch?
2.What will be the troubleshooting steps? where should i start from?
I read somewhere that Universal connector logs cannot be retrieved through normal sessions reports. since logs pulled through universal connector are stored in a table at the backend and it has to be pulled to collector through reports. But i am not sure if its correct or not. I would appreciate any help.
Thanks
------------------------------
sara rehan
------------------------------