Akamai Edge DNS - S3 ingestion

Prev Next

Akamai Edge DNS is a cloud-based, highly available authoritative DNS service designed to deliver 24/7 reliability, superior performance, and robust protection against DDoS attacks. For detailed information refer this document.

Integration Method: AWS S3

Tables: DNS Activity (4003)

This integration supports the following events.

Event

Description

DNS Activities

Captures DNS query and response activities from Akamai Edge DNS for DNS traffic monitoring and analysis.

Note:

Akamai Edge DNS is a continuously updated cloud service. As of this doc preparation, latest release was in Jul 2025.

Prerequisites

  • The user should have access to the AWS portal.

  • The user should have access to the AWS S3 and access to create an S3 bucket, update the bucket policies, and create event notification.

  • The user should have access to the DataBee console.

Configuration overview

  1. Create S3 Bucket for Akamai Edge DNS logs.

  2. Configure akamai to ingest DNS logs into aws S3 bucket

  3. Add the Akamai Edge DNS in the DataBee console with the below parameters.

    DataBee Parameter

    AWS VPC Parameter

    S3 Bucket Name

    Bucket Name

    AWS Region

    Bucket Region

Akamai Edge DNS Configuration

Create S3 bucket

  1. Sign in to the AWS Management Console and open the Amazon S3 console.

  2. In the navigation bar on the top of the page, choose the Region in which you want to create a bucket.

  3. Create Bucket

    1. In the left navigation pane, choose General purpose buckets.

    2. Choose Create bucket. The “Create bucket” page opens.

  4. For Bucket name, enter a name for your bucket. The bucket name must:

    1. Be unique within a partition. A partition is a grouping of regions. AWS currently has three partitions: aws (commercial Regions), aws-cn (China Regions), and aws-us-gov (AWS GovCloud (US) Regions).

    2. It is between 3 and 63 characters long.

    3. Consist only of lowercase letters, numbers, periods (.), and hyphens (-). For best compatibility, we recommend that you avoid using periods (.) in bucket names, except for buckets that are used only for static website hosting.

    4. Begin and end with a letter or number.

    5. For a complete list of bucket-naming rules, see General purpose bucket naming rules.

    6. Copy the bucket name for later use.

  5. Configure the Object Ownership, Block Public Access settings, Bucket Versioning, and Tags according to your preferences.

  6. Select the encryption type for Default encryption of object. If you want to encrypt the data with AWS KMS key, then follow Create a KMS key.

  7. Click Create Bucket.

Configure Akamai Edge DNS to ingest logs into AWS S3 bucket

  1. Login to the Akamai dashboard.
     

  2. Click on the services button on the top left corner as shown.
     

  3. Click on DataStream under COMMON SERVICES.
     

  4. Click on the Create stream and select Edge DNS.
     

  5. Enter Display Name for the stream, then select the zones for which you want to collect the data and then click on Next.
     

  6. Under Data sets, select Include all checkbox and under Log Format select Json and then click on Next.
     

  7. Under destination, select Amazon S3 and enter the required information in the form and then click on Validate & Save and then click on Next.

    1. Bucket – Name of bucket you created previously.

    2. Path – Enter following logs/{%Y/%d/%m/%H/%M/%S/%streamid/%streamversion}

    3. Region – Enter the name of region in which your bucket exists (Example: us-east-1)

    4. Access Key ID & Secret Access Key – Enter your access key and secret key of amazon for authentication.
       

  8. Review your configuration and select the checkbox to receive an email once stream is activated and then click on Save stream.
     

DataBee Configuration

  1. Login to the DataBee UI, navigate to Data > Data Feeds and click the Add New Data Feed button.

  2. Search for Akamai Edge DNS and click it as shown below.

  3. Click on the AWS S3 option for collection method.

  4. In the configuration page, confirm the following:

    • Data feed Name: Name of the feed you want

    • Owner Name: Name of the owner

    • Owner E-mail: Email of the owner

    • S3 Bucket Name: Name of the bucket

    • AWS Region: Region of the bucket

    • Compression: Select gzip

    • Content Type: Select JSON Lines

    • KMS Encryption Key (optional): Paste the KMS Key, if KMS key is setup for bucket

    • SNS Topic ARN (optional): Enter the SNS Topic ARN

  5. Scroll down and click on Get S3 Bucket Policy, copy the IAM policy and apply to your AWS S3 bucket created previously.

  6. Copy the policy statement to clipboard.

  7. Go to the Permissions tab in the bucket. Navigate to Bucket policy and click the Edit button.

  8. Add the bucket policy statement copied from the DataBee and save the bucket policy.

  9. Setup AWS S3 bucket notification.

  10. Copy the SQS ARN to clipboard.

  11. Copy the SQN to clipboard.

  12. Go to the Properties tab of the bucket and Navigate to Event notifications and click Create event notification.

  13. Enter the General configuration details and select the Event types for Object creation.

  14. Set the Destination

    1. Select SQS Queue as Destination

    2. Select option to Enter SQS queue ARN

    3. Paste the SQS queue ARN

    4. Click Save Changes

  15. Click on Test Connection button to check the connection between AWS S3 and DataBee.

  16. Click Submit.

Troubleshooting Tips

  • If you cannot verify the bucket in the Akamai Edge DNS, verify the Access Key ID and Secret Access Key are properly pasted and check whether the region is set to proper value and bucket resides in same region.

  • If you cannot see the data into DataBee, please validate the bucket policies and permissions configured properly.

Copyright © 2026 DataBee®, A Comcast Company.
DataBee® is a registered trademark of Comcast.