Stream Audit Log Events to your customers’ SIEM providers.
Log Streams allow your customers to stream Audit Logs directly to their Security Incident and Event Management (SIEM) providers like Datadog, Splunk, AWS S3, or Google Cloud Storage.
The Google Cloud Storage log streams destination is currently in beta, contact customer support for more information.
This gives your customers greater control over their Audit Logs by allowing them to apply custom indexing and monitoring of their events in the SIEM provider along with events from other cloud services they use.
Log Streams can be created by either configuring the Log Stream through your WorkOS Dashboard or by allowing your customer's IT admin to configure it themselves through the WorkOS Admin Portal.
To configure a Log Stream through the WorkOS Dashboard, navigate to an organization and click “Configure”.
You will be promoted to select a destination from a dropdown, click “Save connection”. You will then be prompted to provide specific configuration for the selected destination.
The Admin Portal can be accessed via a Setup Link found in the Organization page within the Dashboard. Click “Generate” and select “Log Streams”. Copy the link and send it to the organization's IT admin who will be configuring Log Streams.
You can also guide users to the Admin Portal by redirecting them to a programmatically generated Admin Portal link directly from your application.
Once redirected to the Admin Portal, the user will be prompted to select a destination and will be provided with step-by-step configuration instructions for the selected destination.
If you’re interested in custom-branding the Admin Portal, please reach out to WorkOS support.