Sources

Sources

Connect your security logs and events from cloud providers, SaaS applications, and infrastructure to RunReveal’s security data platform.

87 sources
1Password

1Password

View docs
Abnormal AI

Abnormal AI

View docs
Atlassian

Atlassian

View docs
Auth0

Auth0

View docs
Authentik Audit Logs

Authentik Audit

View docs
AWS ALB

AWS ALB

View docs
AWS Cloudtrail Logs

AWS Cloudtrail

View docs
AWS DNS Logs

AWS DNS

View docs
AWS Flow Logs

AWS Flow

View docs
AWS Hosted Zone

AWS Hosted Zone

View docs
AWS Network Firewall

AWS Network Firewall

View docs
AWS Redshift

AWS Redshift

View docs
AWS S3 Access Logs

AWS S3 Access

View docs
AWS WAF Logs

AWS WAF

View docs
Azure Activity Logs

Azure Activity

View docs
Azure Entra Logs

Azure Entra

View docs
Azure Flow Logs

Azure Flow

View docs
Backfill

Backfill

View docs
Bitwarden

Bitwarden

View docs
Box

Box

View docs
CircleCI Audit Logs

CircleCI Audit

View docs
Cloudentity Logs

Cloudentity

View docs
Cloudflare Access Requests

Cloudflare Access Requests

View docs
Cloudflare Audit Log

Cloudflare Audit Log

View docs
Cloudflare Firewall Logs

Cloudflare Firewall

View docs
Cloudflare Gateway DNS Logs

Cloudflare Gateway DNS

View docs
Cloudflare Gateway HTTP Logs

Cloudflare Gateway HTTP

View docs
Cloudflare Gateway Network

Cloudflare Gateway Network

View docs
Cloudflare HTTP Log

Cloudflare HTTP Log

View docs
Cloudflare R2 Generic Source

Cloudflare R2 Generic Source

View docs
CrowdStrike

CrowdStrike

View docs
CrowdStrike Falcon Data Replicator

CrowdStrike Falcon Data Replicator

View docs
Cyberhaven Logs

Cyberhaven

View docs
DNSFilter

DNSFilter

View docs
Dope Security

Dope Security

View docs
Dope Security Webhook

Dope Security Webhook

View docs
Dropbox

Dropbox

View docs
Duo Security

Duo Security

View docs
Fastly WAF

Fastly WAF

View docs
FireHydrant

FireHydrant

View docs
Formal Security

Formal Security

View docs
GCP Logs

GCP

View docs
Generic Azure Blob

Generic Azure Blob

View docs
Generic GCP PubSub

Generic GCP PubSub

View docs
Generic GCS Blob

Generic GCS Blob

View docs
Github

Github

View docs
Github Webhook Logs

Github Webhook

View docs
Gitlab

Gitlab

View docs
Google Workspace

Google Workspace

View docs
GuardDuty

GuardDuty

View docs
HashiCorp Vault

HashiCorp Vault

View docs
Heroku

Heroku

View docs
JAMF Protect

JAMF Protect

View docs
JAMF Protect via Webhook

JAMF Protect via Webhook

View docs
JAMF Webhooks

JAMF Webhooks

View docs
JumpCloud

JumpCloud

View docs
Keeper Security

Keeper Security

View docs
Kubernetes Audit Log

Kubernetes Audit Log

View docs
Linear Audit Logs

Linear Audit

View docs
Lumos Logs

Lumos

View docs
MongoDB

MongoDB

View docs
n8n

n8n

View docs
Notion

Notion

View docs
Obsidian Logs

Obsidian

View docs
Okta

Okta

View docs
Opal Logs

Opal

View docs
OpenTelemetry (OTLP)

OpenTelemetry (OTLP)

View docs
PagerDuty

PagerDuty

View docs
Palo Alto Panorama Traffic

Palo Alto Panorama Traffic

View docs
Reveald

Reveald

View docs
S3 Generic

S3 Generic

View docs
Sentinel One

Sentinel One

View docs
SentinelOne Endpoint Logs

SentinelOne Endpoint

View docs
Slack

Slack

View docs
Snowflake

Snowflake

View docs
Sophos

Sophos

View docs
Structured Webhook

Structured Webhook

View docs
Tailscale Audit

Tailscale Audit

View docs
Tailscale Flow

Tailscale Flow

View docs
Teleport Cloud Audit Logs

Teleport Cloud Audit

View docs
Teleport Cloud Audit Logs via webhook

Teleport Cloud Audit Logs via webhook

View docs
Twingate Logs

Twingate

View docs
Webflow Audit

Webflow Audit

View docs
Webhook Generic Logs

Webhook Generic

View docs
Wiz Threats

Wiz Threats

View docs
Workday

Workday

View docs
Zendesk

Zendesk

View docs

Ingest Methods

RunReveal sources provide a few different ingestion methods for sending us data. Some sources may provide more than one option when setting it up.

multi-ingest

Webhook

A webhook source will generate a unique URL that can be used to forward events to. This URL is provided to your app and events are sent to RunReveal and processed.

Webhook sources can be the easiest to setup and maintain but are the most prone to errors. Networking issues that may cause HTTP requests to fail can mean events are lost. If given an option, setting up retries for events can give some error handling in these scenarios. Every source is different and retries are not guaranteed to be available.

Polling

A polling source is the most common ingestion method that RunReveal offers. Polling sources work by making an API call to the source and returning events that have occurred. These API calls are usually performed on a 60 second timer, RunReveal stores a token indicating where we left off and requests all new events (some sources may only request a limited amount to reduce the number of events returned).

Every polling source is different, but generally RunReveal requires some sort of account identifier and some sort of access credentials to view your logs. These access credentials are stored in RunReveal, in an encrypted format, and used to authenticate to the source on your behalf. If an error occurs such as a network outage or the source is down, RunReveal will be able to pick up where we left off to make sure no logs are missed.

Object Storage

RunReveal offers a few different object storage providers and methods to ingest logs. However, these ingestion types all work in a similar manner allowing you to keep a backup of your log events in a storage bucket that you control. Sources providing these can range from cloud provider logs, SAAS applications that store logs in a bucket, or event generic buckets that store custom logs.

Below you will find links to help setup and explain each of the object storage providers that we support.

These ingestion types work by:

  1. Storing an object containing a number of events in a blob storage container.
  2. Sending an object creation notification to a message queue.
  3. RunReveal will subscribe to this queue and read new notifications.
  4. RunReveal will download the object listed in the notification.
  5. RunReveal will read, process, and ingest the events in the blob object.

AWS S3 Bucket

Logs are stored in an AWS S3 bucket that is under your control, object creation notifications are forwarded to one of RunReveal’s SNS topics. Once we receive the notification we will download the object and begin processing events.

AWS S3 Bucket with Custom SQS

Similar to the regular S3 method, events are stored in a bucket that you control. Object notifications are instead sent to an SQS queue that is also in your control. RunReveal will subscribe to your SQS queue and process the notifications.

Azure Blob Storage

Logs are stored in a storage account container in your Azure subscription. Object creation notifications are sent to a storage queue where RunReveal will subscribe and process the notifications.

Google Cloud Storage Bucket

Logs are stored in a GCS bucket in your GCP account. Object creation notifications are sent to a pub/sub topic and RunReveal will subscribe to the topic to process the notifications.

Cloudflare R2 Bucket

Logs are stored in an R2 bucket in your Cloudflare account. Object creation notifications are sent to a Cloudflare Workers Queue and RunReveal will read from event notifications from the queue and process the objects that have been created.

Transform

Along with the standard setup for the source, you can also select an existing transform that was created to help normalize your fields.

transform

Leaving this field blank will use the standard transform for this source. Custom sources (e.g. webhooks or object storage) will not have any transformation applied.

Health Checks

Along with adding your source settings to ingest logs, RunReveal offers the ability to enable health checks on your source. A health check will check your source volume every 15 minutes to verify if any logs have been received. Once the threshold limit is reached we will alert the configured notification channels that the source is unhealthy.

You can select the duration that you want health checks to alert on and select the frequency that alerts should be sent. Select the notification channels that you would like to be alerted on, if no notification channels are selected the health check will be run, but no notification will be sent.