Elastic integrations

Stream in logs, metrics, traces, content, and more from your apps, endpoints, infrastructure, cloud, network, workplace tools, and every other common source in your ecosystem. Send alerts to your notification tool of choice. Connect to all the systems that matter with ease.

icon-magnifying-glass

1Password
Abnormal Security
Abuse.ch Malware & URL Threat Intel
Active Directory Entity Analytics
ActiveMQ
Aerospike
Airflow
Akamai
AlienVault Open Threat Exchange (OTX)
Amazon Bedrock
Amazon CloudFront
Amazon CloudWatch
Amazon DynamoDB
Amazon EBS
Amazon GuardDuty
Amazon Kinesis Data Firehose
Amazon RDS
Amazon Redshift
Amazon S3 Storage Lens
Amazon Security Lake
Amazon SNS
Amazon SQS
Amazon VPC
Amazon VPC NAT Gateway
Anomali ThreatStream
Apache Spark
Apache Tomcat
Arista Firewall
Atlassian Confluence
Atlassian Jira
auditd
Auditd Manager
Authentik
AWS API Gateway
AWS Billing
AWS CloudTrail
AWS Elastic Load Balancing
AWS Fargate
AWS Inspector
AWS Lambda
AWS Network Firewall
AWS Security Hub
AWS Transit Gateway
AWS Usage
AWS VPN
AWS WAF
Azure Activity Logs
Azure App Service
Azure Application Gateway
Azure Application Insights
Azure Application State Insights
Azure Audit Logs
Azure Billing
Azure Blob Storage
Azure Container Instance
Azure Container Registry
Azure Container Service
Azure Database Account
Azure Event Hub
Azure Firewall
Azure Front Door
Azure Functions
Azure Monitor
Azure Network Watcher
Azure OpenAI
Azure Platform
Azure Spring Cloud
Azure Storage Account
Azure VM
Azure VM Scale Sets
Azure WAF
Barracuda CloudGen Firewall
Barracuda WAF
Beats
Bitbucket
BitDefender
Bitwarden
Box Events
Bravura Monitor
Broadcom ProxySG
Check Point Firewall
Check Point Harmony Endpoint
CISA Known Exploited Vulnerabilities
Cisco Aironet
Cisco ASA
Cisco Duo
Cisco Firepower Threat Defense
Cisco Identity Services Engine (ISE)
Cisco IOS
Cisco Meraki
Cisco Nexus
Cisco Secure Email Gateway
Cisco Secure Endpoint
Cisco Umbrella
Citrix ADC
Citrix Web Application Firewall
Claroty CTD
Cloud Foundry
Cloudflare
CockroachDB
collectd
Collective Intelligence Framework
Common Event Format (CEF)
Confluence Cloud
Confluence Data Center
Confluence Server
Couchbase
Cribl
CrowdStrike Falcon
CrowdStrike Falcon Intelligence
Custom Threat Intelligence
Custom Windows event logs
Customized Connector
CyberArk Privileged Access Security
CyberArk Privileged Threat Analytics
Cybereason
Darktrace
Data Exfiltration Detection
Digital Guardian
Dropbox
Dropbox Paper
Dropwizard
Elastic Agent
Elastic APM Server
Elasticsearch
Email
Endpoint Security
ESET Protect
ESET Threat Intelligence
F5 BIG-IP
F5 BIG-IP Access Policy Manager
Falco
File Integrity Monitoring
FireEye Network Security
First EPSS
Fleet Server
Fluentd
Forcepoint
Forcepoint Web Security
ForgeRock
Fortinet Forticlient Endpoint Protection
Fortinet FortiEDR
Fortinet Fortigate
Fortinet FortiMail
Fortinet FortiManager
Fortinet FortiProxy
GCP Metrics Input
Gigamon
Gitlab
Gmail
Go Expvar
GoFlow2
Google Cloud
Google Cloud Anthos
Google Cloud Audit
Google Cloud Billing
Google Cloud Compute
Google Cloud Dataproc
Google Cloud DNS
Google Cloud Firestore
Google Cloud Firewall
Google Cloud Functions
Google Cloud GKE
Google Cloud Load Balancing
Google Cloud Pub/Sub
Google Cloud Redis
Google Cloud Stackdriver
Google Cloud Storage
Google Cloud VPC
Google CloudSQL Metrics
Google Drive
Google Santa
Google Security Command Center
Google Workspace
Graphite
GraphQL
HA-Proxy
Hashicorp Vault
HTTP Check
IBM Resilient
IBM Websphere
Icinga
ICMP Check
Imperva Cloud WAF
Imperva WAF
InfluxDB
Infoblox BloxOne DDI
Infoblox NIOS
iptables
Istio
Jaeger
Jamf Compliance Reporter
Jamf Pro
Jamf Protect
JavaScript
Jira Cloud
JIRA Data Center
Jira Server
JMS
JMX Jolokia
journald
JumpCloud
Juniper SRX Series
Keycloak
Kubernetes API Server
Kubernetes Controller Manager
Kubernetes Events
Kubernetes Metrics Service
Kubernetes Proxy
Kubernetes Scheduler
LastPass
Linux
Linux Audit Framework
Linux systemd journals
Log files (Generic)
Logstash
LotL Attack Detection
Lumos
Lyve Cloud
Malware Information Sharing Platform (MISP)
Mandiant Advantage
Memcached
Menlo Security
Microsoft 365 (Office 365) & OneDrive
Microsoft 365 Defender
Microsoft Defender for Cloud
Microsoft Defender for Endpoint
Microsoft DHCP Server
Microsoft DNS Server
Microsoft Entra ID
Microsoft Exchange Message Trace
Microsoft Exchange Server
Microsoft Graph Activity
Microsoft OneDrive
Microsoft Outlook
Microsoft SQL Server
Microsoft Teams
Mimecast
ModSecurity
MQTT
Munin
Nagios XI
NATS Streaming
NetFlow
Netscout Arbor Sightline
Netskope
Network Drive & File Systems
Network Packet Capture
NGINX Ingress Controller
Notion
Okta
Okta Entity Analytics
OpenCanary
OpenCTI
OpenMetrics
OpenTelemetry
OpenText Documentum
OpenTracing
OpsGenie
Oracle Weblogic
Osquery Log Collection
Osquery Manager
PagerDuty
Palo Alto Cortex XDR
Palo Alto Networks
Palo Alto Prisma Access
Palo Alto Prisma Cloud
Pensando
pfSense
PHP FPM
Ping Identity PingOne
Pleasant Password Server
PowerShell
Prebuilt Security Detection Rules
Prometheus
Prometheus Input
Proofpoint OnDemand
Proofpoint Targeted Attack Protection (TAP)
QNAP NAS
Qualys VMDR
Radware DefensePro
Rapid7 InsightVM
Rapid7 Threat Command
Recorded Future
Redis Enterprise
Salesforce
Salesforce Sandboxes
SentinelOne
SentinelOne Cloud Funnel
ServiceNow ITOM
ServiceNow ITSM
ServiceNow SecOps
SharePoint Online
SharePoint Server
SNMP
Snort
Snyk
Sonicwall Firewall
Sophos Central
Sophos UTM
Sophos XG Firewall
Spring Boot
SQL Input
Squid Proxy
StatsD
Stormshield Network Security
Sublime Security
Suricata
Swimlane SOAR
Symantec Endpoint Protection
Sysdig
syslog
Sysmon
Sysmon for Linux
System Audit
Tanium
TCP Check
Teleport
Tenable Security Center
Tenable Vulnerability Management
ThreatConnect
ThreatQuotient
Thycotic Secret Server
Tomcat NetWitness Logs
Trellix EDR Cloud
Trellix ePO
Trend Micro Deep Security
Trend Vision One
Twitter
Tychon
Universal Profiling
Vectra Detect
VMware Carbon Black Cloud
VMware Carbon Black EDR
WatchGuard Firebox
Web Crawler
Webhook
Wiz
X.509 SSL/TLS Certificate Check
xMatters
Zeek (Bro)
Zero Networks
ZeroFox
ZooKeeper
Zscaler Internet Access
Zscaler Private Access