Documentation Index
Fetch the complete documentation index at: https://docs.raxe.ai/llms.txt
Use this file to discover all available pages before exploring further.
Overview
RAXE integrates with enterprise SIEMs to provide centralized threat visibility. Forward scan events in native formats to:Splunk
HTTP Event Collector (HEC) format
CrowdStrike
Falcon LogScale (Humio) ingest
Microsoft Sentinel
Data Collector API with HMAC auth
ArcSight
SmartConnector CEF format
CEF (Generic)
Any CEF-compatible SIEM via HTTP or Syslog
Syslog
UDP, TCP, or TLS transport
CEF (Common Event Format) support means RAXE works with any SIEM that accepts CEF, including QRadar, LogRhythm, Elastic SIEM, Sumo Logic, and more.
Quick Start (CLI)
Configure SIEM integration per customer:Splunk
Configuration
- CLI
- Python SDK
Splunk Event Format
Splunk Options
| Option | Description | Default |
|---|---|---|
--index | Splunk index name | main |
--source | Event source identifier | raxe |
--sourcetype | Splunk sourcetype | _json |
--host | Host identifier | Agent hostname |
CrowdStrike Falcon LogScale
Configuration
- CLI
- Python SDK
CrowdStrike Options
| Option | Description | Default |
|---|---|---|
--repository | LogScale repository | - |
--parser | Custom parser name | - |
Microsoft Sentinel
Configuration
- CLI
- Python SDK
Sentinel Event Format
Events are transformed to PascalCase for Azure conventions:Sentinel Options
| Option | Description | Required |
|---|---|---|
--workspace-id | Azure Log Analytics workspace ID | Yes |
--log-type | Custom log type name | Yes |
Sentinel uses HMAC-SHA256 authentication. The token should be your Log Analytics workspace shared key, base64-encoded.
ArcSight
Configuration
- CLI
- Python SDK
ArcSight Options
| Option | Description | Default |
|---|---|---|
--smart-connector-id | SmartConnector ID | - |
--device-vendor | CEF device vendor | RAXE |
--device-product | CEF device product | ThreatDetection |
CEF (Common Event Format)
CEF support enables integration with any SIEM that accepts CEF, including:- IBM QRadar
- LogRhythm
- Elastic SIEM
- Sumo Logic
- Exabeam
- And many more
CEF over HTTP
- CLI
- Python SDK
CEF over Syslog (UDP)
- CLI
- Python SDK
CEF over Syslog (TCP with TLS)
- CLI
- Python SDK
CEF Message Format
RAXE generates standard CEF messages:CEF Field Mapping
| CEF Field | RAXE Field | Description |
|---|---|---|
rt | timestamp | Receipt time (ms epoch) |
src | installation_id | Source identifier |
suser | agent_id | Agent identifier |
cs1 | prompt_hash | SHA-256 prompt hash |
cs2 | rule_ids | Comma-separated rule IDs |
cs3 | families | Threat families detected |
cs5 | mssp_id | MSSP identifier |
cs6 | customer_id | Customer identifier |
cn1 | prompt_length | Prompt character count |
cn2 | total_detections | Number of detections |
cn3 | scan_duration_ms | Scan latency |
CEF Severity Mapping
| RAXE Severity | CEF Severity | Syslog Priority |
|---|---|---|
none | 0 | 6 (informational) |
LOW | 3 | 5 (notice) |
MEDIUM | 5 | 4 (warning) |
HIGH | 7 | 3 (error) |
CRITICAL | 10 | 2 (critical) |
CEF Options
| Option | Description | Default |
|---|---|---|
--transport | http, udp, or tcp | http |
--port | Syslog port | 514 (UDP), 6514 (TCP) |
--tls | Enable TLS (TCP only) | false |
--facility | Syslog facility | 16 (local0) |
Multi-Customer Routing
The SIEM dispatcher routes events to the correct SIEM based on customer:Testing
Test Connection
View Configuration
Disable SIEM
Event Batching
SIEM adapters batch events for efficiency:| Setting | Default | Description |
|---|---|---|
batch_size | 100 | Events per batch |
flush_interval_seconds | 10 | Max wait before flush |
retry_count | 3 | Retries on failure |
timeout_seconds | 30 | Request timeout |
Troubleshooting
Connection Failed
Connection Failed
- Verify URL is correct (include full path for HEC endpoints)
- Check firewall allows outbound to SIEM
- Verify token/credentials are valid
- Test with curl:
curl -X POST <url> -H "Authorization: Bearer <token>"
Events Not Appearing
Events Not Appearing
- Check SIEM index/repository permissions
- Verify event format matches SIEM expectations
- Check SIEM ingestion logs for parsing errors
- Ensure batch has been flushed (default: 10 seconds)
Syslog Not Receiving
Syslog Not Receiving
- Verify syslog daemon is running
- Check port is correct (514 UDP, 6514 TLS)
- For TLS, ensure certificate is valid
- Check firewall allows UDP/TCP on syslog port
Authentication Errors
Authentication Errors
- Splunk: Token must have HEC permissions
- Sentinel: Use base64-encoded shared key
- CrowdStrike: Use ingest API token
- CEF HTTP: Bearer token format required
Best Practices
Use Dedicated Index/Repository
Use Dedicated Index/Repository
Create a dedicated index (Splunk) or repository (LogScale) for RAXE events. This enables:
- Easier searching and dashboards
- Separate retention policies
- Access control isolation
Enable TLS for Syslog
Enable TLS for Syslog
Always use TLS (port 6514) for syslog in production. UDP syslog is unencrypted and can be spoofed.
Monitor Delivery
Monitor Delivery
Use audit logging to track SIEM delivery success rates:
Per-Customer Configuration
Per-Customer Configuration
Different customers may use different SIEMs. Configure each customer individually to route events correctly.
