Harness IO

Prev Next
Self Service Ingestion

Connect this data source on your own, using the Hunters platform.

TL;DR

Supported data types

3rd party detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Harness Audit logs

✅

✅

harness_audit_logs

NDJSON

S3


Overview

image.pngHarness is a Software Delivery Platform to use AI to simplify DevOps processes - CI, CD & GitOps, Feature Flags, Cloud Costs.

Integrating the Harness product into Hunters allows ingestion of the data, as well as consuming supported Hunters' detection and investigation content over the source.

Supported data types

Harness Audit logs

Table name: harness_audit_logs

Harness.io Audit Logs provide a detailed record of user and system activities within the Harness platform. They track events such as configuration changes, deployments, user access, and API usage, ensuring transparency and accountability. These logs help teams monitor actions, detect anomalies, and maintain compliance with organizational and regulatory requirements. With intuitive filtering and export options, Harness.io Audit Logs enable efficient auditing and enhanced security for DevOps workflows.

Learn more here.

Send data to Hunters

Hunters supports the ingestion of Harness logs via an intermediary AWS S3 bucket.

To connect Harness logs:

  1. Export your logs from Harness to an AWS S3 bucket by following this guide.

  2. Once the export is completed and the logs are collected to S3, follow the steps in this section.

Expected format

Logs are expected in JSON format.

[{"auditEventId":"6466455d0","auditEventAuthor":{"principal":{"type":"USER","identifier":"Xmxu3IqUQZ_g","email":"ksha@abc.com"}},"auditModule":"TEMPLATESERVICE","auditResource":{"type":"TEMPLATE","identifier":"temp_post_deployment_image_tagging"},"auditResourceScope":{"accountIdentifier":"UaiITdI9niH_A","orgIdentifier":"default","projectIdentifier":"AbcApp"},"auditAction":"UPDATE","auditHttpRequestInfo":{"requestMethod":"PUT","clientIP":"1000:001:0000:00b0:0018:e111:bcf0:e41c"},"auditEventTime":1684424026.862000000,"auditEventMetadata":{"batchId":"6466159f320709"}},{"auditEventId":"6467dd516631","auditEventAuthor":{"principal":{"type":"USER","identifier":"Xmx5MsiMQUezw","email":"prat@xyz.com"}},"auditModule":"PMS","auditResource":{"type":"PIPELINE","identifier":"dpipelinev2"},"auditResourceScope":{"accountIdentifier":"_lnNiITdI9niH_A","orgIdentifier":"default","projectIdentifier":"XyzApp"},"auditAction":"UPDATE","auditHttpRequestInfo":{"requestMethod":"PUT","clientIP":"1000:800:1000:00b0:0000:e000:bcf0:0000"},"auditEventTime":1684424852.648000000,"auditEventMetadata":{"batchId":"befe159f320709"}}]