Hi Everyone,
Happy New Year 2026! 🎉
I am new to Google SecOps and have a few questions regarding log ingestion via Bindplane, specifically around Google Secops standardization and log visibility.
In our environment, we have Bindplane Gateways that collect logs from multiple Bindplane agents and forward the data to Google SecOps. While forwarding the logs, we apply the SecOps Standardization processor so that SecOps can assign a log type (metadata.log_type) and perform UDM field mapping using the appropriate parser.
I am looking for clarification on the following scenarios:
- SecOps Standardization processor not applied
- Are the logs still ingested and searchable in Google SecOps?
- If searchable, what value is assigned to metadata.log_type in the SecOps console ?
- Does this scenario only impact UDM parsing and detections, or can it affect ingestion itself?
- SecOps Standardization processor applied with an incorrect log type (Example: Windows event logs standardized as NIX_SYSTEM)
- Are these events still ingested and searchable in SecOps?
- If searchable, does metadata.log_type reflect the configured (incorrect) value, such as NIX_SYSTEM?
- Will the events fail parsing but still be visible as raw logs, or are they dropped at any stage of the ingestion pipeline?
Based on my understanding, these scenarios should primarily impact parsing and UDM normalization.
Any clarification or best practices would be greatly appreciated.
Thank you in advance for your guidance and support.
I’m new to Google SecOps and appreciate any clarification or best-practice recommendations from the community.
