Google SecOps with Bindplane Quick Start

Sign up for Bindplane Cloud. We recommend using Bindplane Cloud to get started. It's the fastest and easiest way to build out your telemetry pipelines. It includes a free tier for proof-of-concepts and development projects.

If you want to see self-hosted options, view the solutions, here.

NOTE

The initial license will be the “Free” edition. This has full functionality, but is limited to a maximum of 10 collectors. To change license levels, contact [email protected], or post a question in the Bindplane Community Slack.

Bindplane Architecture Diagram

Bindplane docs - Google SecOps with Bindplane Quick Start - image 1

Configure your Bindplane Organization

Give your Organization a name.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 2

After you sign in for the first time, you can check in the Organization, Project, and License level in the upper right menu.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 3

Configure the SecOps Destination

Create a Configuration with a Destination for sending data to your Google SecOps instance.

Destinations can be created within Configurations for Agents. You'll learn how to create one in the Library, so that it can be used by multiple Configurations.

Go to Library in the UI. Click Add Destination, and select Google SecOps.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 4
Bindplane docs - Google SecOps with Bindplane Quick Start - image 5

You can use two different APIs within Google SecOps. This guide will showcase the default gRPC API.

You can set the appropriate region, by following the “Read More About Regional Endpoints” link and finding the endpoint appropriate for your area.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 6

Customer ID

You can find your SecOps Customer ID under Settings > Profile > Organization Details in the SecOps Interface.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 7

JSON Authentication

JSON Authentication is the recommended Authentication Method for sending data to SecOps.

You can download a JSON file from the SecOps Interface under Settings > Collection Agents > Ingestion Authentication File.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 8

Copy and paste the JSON contents into the Credentials field and set the Customer ID. These are the two required settings to send data to Google SecOps.

Save the configuration, and name the Destination Configuration.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 9

It's now saved to the Library and can be used for any of your Configurations.

Configure Linux auditd Log Collection

Now, you'll configure collection of auditd logs on a Linux machine.

NOTE

Deploy/have access to a Linux system with auditd. Here's a list of supported operating systems. We recommend deploying on a GCE instance with CentOS, CentOS Stream 9.

Install a Collector

First, deploy the BDOT Collector on your Linux machine. Navigate to Agents > Platform Linux, and select Agent Type of 1.x.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 10

The next step will have a one-line install script. Run this on your Linux machine wait to see the OTel Collector appear in the list.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 11
Bindplane docs - Google SecOps with Bindplane Quick Start - image 12

Configure the Linux auditd Logs Source

Create a new Configuration.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 13

Add the "File" Source.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 14

Add the default file path for auditd.

/var/log/audit/audit.log

Set Parse Format: None. This is because parsing is done in Google SecOps and is not required beforehand.

Set the Start At to beginning.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 15

Add the Google SecOps Destination that was created earlier and Save the Configuration.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 16

The configuration will not have any collectors attached right away. To add a collector, click the Add Agent at the bottom of the Configuration and Start Rollout to deploy it.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 17

View the Configuration File

You can view the OpenTelemetry Collector pipeline configuration by clicking View Configuration File.

This pipeline may be useful for troubleshooting, or as a reference. This is the configuration that is rolled out to the collectors via the OpAMP protocol.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 18
# This configuration is managed by Bindplane.
# Configuration: linux-auditd-secops:1
receivers:
  filelog/source@_01JH89S7FGQE45F1SWFTGKN81N:
    delete_after_read: false
    encoding: utf-8
    fingerprint_size: 1kb
    force_flush_period: 500ms
    include:
      - /var/log/audit/audit.log
    include_file_name: true
    include_file_name_resolved: false
    include_file_path: false
    include_file_path_resolved: false
    max_concurrent_files: 1024
    max_log_size: 1MiB
    operators:
      - field: attributes.log_type
      type: add
      value: file
    poll_interval: 200ms
    retry_on_failure:
      enabled: false
    start_at: beginning
    storage: file_storage/source@_01JH89S7FGQE45F1SWFTGKN81N

processors:
  resourcedetection/source@_01JH89S7FGQE45F1SWFTGKN81N:
    detectors:
      - system
    system:
      hostname_sources:
        - os

exporters:
  chronicle/SecOps:
  compression: gzip
  creds: (sensitive)
  customer_id: b536658e-469e-44a5-b764-d5ab15b72ce0
  endpoint: malachiteingestion-pa.googleapis.com
  log_type: NIX_SYSTEM
  namespace: null
  raw_log_field: body
  retry_on_failure:
    enabled: true
    initial_interval: Ss
    max_elapsed_time: 300s
    max_interval: 30s
  sending_queue:
    enabled: true
    num_consumers: 10
    queue_size: 5000
    storage: file_storage/SecOps
  timeout: 5s

extensions:
  file_storage/SecOps:
    compaction:
      directory: ${0IQ_OTEL_COLLECTOR_HOME}/storage
      on_rebound: true
    directory: ${0I1Q_OTEL_COLLECTOR_HOME}/storage
  file_storage/source@_01JH89S7FGQE45F1SWFTGKN81N:
    compaction:
      directory: ${0IQ_OTEL_COLLECTOR_HOME}/storage
      on_rebound: true
    directory: ${0I1Q_OTEL_COLLECTOR_HOME}/storage

# ...

Configure SecOps Standardization Processor

The auditd logs are now flowing to Google SecOps via the collector. You can see it in the processor view where Bindplane shows a snapshot of the telemetry via the OpAMP connection.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 19

Follow the Recommendation with View, where it will show an example SecOps Standardization processor configuration.

Set these values in the SecOps Standardization Processor configuration:

  • Log type: AUDITD

  • Namespace: linux-app-audit

  • Ingestion Labels KV: application training

Bindplane docs - Google SecOps with Bindplane Quick Start - image 20

This will add the following Attributes field. Note that these fields could also be added manually with the Add Fields processor. The SecOps Standardization makes this easy to do.

Bindplane docs - Google SecOps with Bindplane Quick Start - image 21

Silent Host Monitoring

View the Silent Host Monitoring how-to guide to learn more.

Configure Windows Events Log Collection

The same configuration will work for Windows Events as a Source.

Make sure to check Raw Logs, under Advanced in the Windows Event Source

Bindplane docs - Google SecOps with Bindplane Quick Start - image 22

Last updated

Was this helpful?