Migrating from the Deprecated Google Chronicle Forwarder

Google SecOps is officially deprecating the Chronicle (SecOps) legacy forwarder in January 2027. All data ingestion will transition to OpenTelemetry (OTel) collectors using Bindplane as the official ingestion platform. This shift provides a more scalable, standardized, and manageable foundation for collecting log and telemetry data, with stronger security controls and long-term support.

For background on the timeline and rationale, see Google's deprecation announcement.

Differences at a Glance

The Chronicle Forwarder and Bindplane deliver similar ingestion outcomes but differ in several operational areas that affect migration planning.

Area
Chronicle Forwarder
Bindplane

Deployment model

Docker container only

Health checks

Readiness/liveness endpoints with configurable status codes and drain behavior

Batching

Byte-based batching

Log Labeling

Labels set per forwarder config

PCAP support

Configurable in forwarder config

Migration Workflow

This section focuses on the Forwarder → Bindplane migration process. For installation and configuration details, visit the Getting Started with Bindplane page.

Step 1: Inventory your existing deployment

  • Review existing Chronicle Forwarder deployments.

  • Note log types, ports, ingestion labels, and PCAP usage (if applicable).

  • Identify the volume of data per forwarder for sizing purposes.

Step 2: Deploy Bindplane alongside forwarder (dark launch)

  • Install Bindplane on the same or equivalent hosts.

  • Recreate equivalent input sources in Bindplane. See supported sources here.

  • Keep Chronicle Forwarder active during this stage to minimize risk.

Step 3: Configure Google SecOps Standardization Processor

Step 4: Adjust batching and queueing

Step 5: Update load balancer health checks

  • Chronicle uses /meta/ready and /meta/available with 204 responses and drain behavior.

  • Bindplane uses a single health check endpoint (default /, port 13133) with 200 response and optional TLS/mTLS. See more here.

  • Update Load Balancer configuration to avoid failed probes and outages.

Step 6: Cutover in stages

  • Run both forwarder and Bindplane in parallel.

  • Route a portion of traffic to Bindplane, then scale up gradually.

  • Validate event counts, throughput, and SecOps API performance before full cutover.

Step 7: Validate and rollback plan

  • Confirm parity of event volume and latency between systems.

  • Keep forwarder in LB target groups for easy rollback.

  • Once stable, decommission Chronicle Forwarder.

Last updated

Was this helpful?