Hello community , how i can identify forwarder logs in the audit logs ?
thanks in advance
Solved! Go to Solution.
You may use this query in logs explorer and choose the time range:
use GCP cloud monitoring can check the forwarder metrics
sudo docker logs cfps
sudo docker logs cfps -f
docker logs cfps &> logs.txt
Hello ,
Thank you for your reply
how i can ingest forwarder metrics into chronicle , thanks
I am not sure if I understood your question. The forwarder metrics automatically are sent to cloud monitoring. You don't have to setup anything. To monitor metrics then you can follow the instructions from Ash. The forwarder logs can be viewed in the Logs explorer as I mentioned above.
And if i don't have Access to GCP ? I have only access on the SIEM
These logs can be retrieved on the siem ? what configuration should be done from GCP team to send forwarder logs to the siem ?
You may have a couple of options (disclaimer, I have not tested this and would welcome comments)
Possible Option 1:
Possible Option 2:
In either case, assuming the raw data is successfully converted to UDM, you would likely want to create a custom Yara-L rule for any event of interest for Alerting and possibly a custom SOAR playbook to take appropriate actions.
You can do the below -
To set up notifications that monitor ingestion health metrics specific to Google SecOps, do the following:
In the Google Cloud console, select Monitoring.
In the navigation pane, select Alerting and then click Create policy.
On the Select a metric page, click Select a metric.
See this link for details https://cloud.google.com/chronicle/docs/ingestion/ingestion-notifications-for-health-metrics#forward...