I have installed the BindPlane agent on a Windows server to ingest Windows logs and listen on port 514 for firewall logs, then ingest them into Google SecOps SIEM.
The Windows log ingestion is working correctly, but the firewall log ingestion is not.
Can someone check my configuration file?
receivers:
windowseventlog/source0__security:
attributes:
log_type: windows_event.security
channel: security
max_reads: 100
poll_interval: 1s
raw: true
start_at: end
udplog/source0_firewall:
add_attributes: true
async:
max_queue_length: 100
processors: 3
readers: 1
listen_address: 0.0.0.0:514
operators:
- field: attributes.log_type
type: add
value: udp
exporters:
chronicle/chronicle_w0_labels:
compression: gzip
creds: ''
customer_id: xyz
endpoint: asia-south1-malachiteingestion-pa.googleapis.com
ingestion_labels:
env: dev
log_type: FORTINET_FIREWALL
namespace: TEST_FORTINET_FIREWALL
raw_log_field: body
chronicle/chronicle_w1_labels:
compression: gzip
creds: ''
customer_id: xyz
endpoint: asia-south1-malachiteingestion-pa.googleapis.com
ingestion_labels:
env: dev
log_type: WINEVTLOG
namespace: TEST_WINDOWS
raw_log_field: body
service:
pipelines:
logs/source0__chronicle_w_labels-0:
receivers:
- windowseventlog/source0__security
exporters:
- chronicle/chronicle_w1_labels
logs/source0_firewall__chronicle_w_labels-0:
receivers:
- udplog/source0_firewall
exporters:
- chronicle/chronicle_w0_labels
Also note, I have checked the listening port using netstat -ano, which shows that port 514 is being listened to by a service related to ObserverIQ.