Google SecOps with Bindplane Quick Start

Sign up for Bindplane Cloud. We recommend using Bindplane Cloud to get started. It's the fastest and easiest way to build out your telemetry pipelines. It includes a free tier for proof-of-concepts and development projects.

If you want to see self-hosted options, view the solutions, here.

NOTE

The initial license will be the “Free” edition. This has full functionality, but is limited to a maximum of 10 collectors. To change license levels, contact [email protected], or post a question in the Bindplane Community Slack.

Bindplane Architecture Diagram

Bindplane docs - Google SecOps with Bindplane Quick Start - image 1

Configure your Bindplane Organization

Give your Organization a name.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 2

After you sign in for the first time, you can check in the Organization, Project, and License level in the upper right menu.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 3

Configure the SecOps Destination

Create a Configuration with a Destination for sending data to your Google SecOps instance.

Destinations can be created within Configurations for Agents. You'll learn how to create one in the Library, so that it can be used by multiple Configurations.

Go to Library in the UI. Click Add Destination, and select Google SecOps.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 4
Bindplane docs - Google SecOps with Bindplane Quick Start - image 5

You can use two different APIs within Google SecOps. This guide will showcase the default gRPC API.

You can set the appropriate region, by following the “Read More About Regional Endpoints” link and finding the endpoint appropriate for your area.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 6

Customer ID

You can find your SecOps Customer ID under Settings > Profile > Organization Details in the SecOps Interface.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 7

JSON Authentication

JSON Authentication is the recommended Authentication Method for sending data to SecOps.

You can download a JSON file from the SecOps Interface under Settings > Collection Agents > Ingestion Authentication File.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 8

Copy and paste the JSON contents into the Credentials field and set the Customer ID. These are the two required settings to send data to Google SecOps.

Save the configuration, and name the Destination Configuration.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 9

It's now saved to the Library and can be used for any of your Configurations.

Configure Linux auditd Log Collection

Now, you'll configure collection of auditd logs on a Linux machine.

NOTE

Deploy/have access to a Linux system with auditd. Here's a list of supported operating systems. We recommend deploying on a GCE instance with CentOS, CentOS Stream 9.

Install a Collector

First, deploy the BDOT Collector on your Linux machine. Navigate to Agents > Platform Linux, and select Agent Type of 1.x.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 10

The next step will have a one-line install script. Run this on your Linux machine wait to see the OTel Collector appear in the list.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 11
Bindplane docs - Google SecOps with Bindplane Quick Start - image 12

Configure the Linux auditd Logs Source

Create a new Configuration.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 13

Add the "File" Source.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 14

Add the default file path for auditd.

Set Parse Format: None. This is because parsing is done in Google SecOps and is not required beforehand.

Set the Start At to beginning.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 15

Add the Google SecOps Destination that was created earlier and Save the Configuration.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 16

The configuration will not have any collectors attached right away. To add a collector, click the Add Agent at the bottom of the Configuration and Start Rollout to deploy it.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 17

View the Configuration File

You can view the OpenTelemetry Collector pipeline configuration by clicking View Configuration File.

This pipeline may be useful for troubleshooting, or as a reference. This is the configuration that is rolled out to the collectors via the OpAMP protocol.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 18

Configure SecOps Standardization Processor

The auditd logs are now flowing to Google SecOps via the collector. You can see it in the processor view where Bindplane shows a snapshot of the telemetry via the OpAMP connection.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 19

Follow the Recommendation with View, where it will show an example SecOps Standardization processor configuration.

Set these values in the SecOps Standardization Processor configuration:

  • Log type: AUDITD

  • Namespace: linux-app-audit

  • Ingestion Labels KV: application training

Bindplane docs - Google SecOps with Bindplane Quick Start - image 20

This will add the following Attributes field. Note that these fields could also be added manually with the Add Fields processor. The SecOps Standardization makes this easy to do.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 21

Silent Host Monitoring

View the Silent Host Monitoring how-to guide to learn more.

Configure Windows Events Log Collection

The same configuration will work for Windows Events as a Source.

Make sure to check Raw Logs, under Advanced in the Windows Event Source

Bindplane docs - Google SecOps with Bindplane Quick Start - image 22

Last updated

Was this helpful?