Migrating from the Deprecated Google Chronicle Forwarder
Google SecOps is officially deprecating the Chronicle (SecOps) legacy forwarder in January 2027. All data ingestion will transition to OpenTelemetry (OTel) collectors using Bindplane as the official ingestion platform. This shift provides a more scalable, standardized, and manageable foundation for collecting log and telemetry data, with stronger security controls and long-term support.
For background on the timeline and rationale, see Google's deprecation announcement.
Differences at a Glance
The Chronicle Forwarder and Bindplane deliver similar ingestion outcomes but differ in several operational areas that affect migration planning.
Health checks
Readiness/liveness endpoints with configurable status codes and drain behavior
Log Labeling
Labels set per forwarder config
Migration Workflow
This section focuses on the Forwarder → Bindplane migration process. For installation and configuration details, visit the Getting Started with Bindplane page.
Step 1: Inventory your existing deployment
Review existing Chronicle Forwarder deployments.
Note log types, ports, ingestion labels, and PCAP usage (if applicable).
Identify the volume of data per forwarder for sizing purposes.
Step 2: Deploy Bindplane alongside forwarder (dark launch)
Install Bindplane on the same or equivalent hosts.
Recreate equivalent input sources in Bindplane. See supported sources here.
Keep Chronicle Forwarder active during this stage to minimize risk.
Step 3: Configure Google SecOps Standardization Processor
Define log type, namespace, and ingestion labels.
Ensure alignment with existing Forwarder values to maintain UDM parsing.
Step 4: Adjust batching and queueing
Chronicle batches by bytes; Bindplane batches by batch count.
Start with Bindplane SecOps batching defaults and adjust based on observed throughput.
Step 5: Update load balancer health checks
Chronicle uses
/meta/ready
and/meta/available
with204
responses and drain behavior.Bindplane uses a single health check endpoint (default
/
, port13133
) with200
response and optional TLS/mTLS. See more here.Update Load Balancer configuration to avoid failed probes and outages.
Step 6: Cutover in stages
Run both forwarder and Bindplane in parallel.
Route a portion of traffic to Bindplane, then scale up gradually.
Validate event counts, throughput, and SecOps API performance before full cutover.
Step 7: Validate and rollback plan
Confirm parity of event volume and latency between systems.
Keep forwarder in LB target groups for easy rollback.
Once stable, decommission Chronicle Forwarder.
To get the most out of your deployment, see the Using Google SecOps with Bindplane Best Practices guide.
Last updated
Was this helpful?