Configure Google Security Command Center logs for the Splunk Add-on for Google Cloud Platform¶
Configure the HTTP Event Collector (HEC) to ingest Google Security Command Center logs.
- Configure HEC from datainputs in your Splunk deployment and
provide
google:gcp:security:alerts
sourcetype.
To Configure Google Security Command Center logs for the Splunk Add-on for Google Cloud Platform, do the following:
- Create the Pub/Sub Topics. Navigate to Pub/Sub in your project and
create two topics:
- A primary topic to hold messages to be delivered.
- A secondary, dead-letter topic, to store undeliverable messages when Dataflow cannot stream to the HTTP Event Collector (HEC). For example, a misconfigured HEC SSL certificate, disabled HEC token, or message processing error by Dataflow.
- Create your subscription to query both topics created in the last step.
- Enter any name for your subscription
- Select the Pub/Sub primary topic created in the previous step
- Leave the rest of the values default or customize to your organization’s preference
- Repeat the same steps for your dead-letter topic
- In the Google Cloud console, go to the Security Command Center Findings page.
- Export the logs to your Google Cloud Pub/Sub by providing filters in query parameter if any. See the Create a continuous export to Pub/Sub topic in the Export Security Command Center data documentation.
- Create a Dataflow pipeline in Google Console.
See the Pub/Sub to Splunk template topic in
the Google-provided templates documentation.
- Select Pub/Sub to Splunk in Dataflow template.
- Select Pub/Sub input subscription, created in previous steps.
- Provide Splunk HEC URL.
- Select output deadletter Pub/Sub topic, created in previous steps.
- Provide HEC Authentication token, created in previous steps.
- Enter any additional settings pertinent to your organization.
- Run job.
- Check the Security Command Center logs in your Splunk deployment
under this
google:gcp:security:alerts
sourcetype.