Hi,
I want to verify that Cloud Armor logs are indeed visible in Chronicle through the Load Balancer logs.
From what I understand, Cloud Armor events are included in the external load balancer logs and should appear in Chronicle with
event_type = "NETWORK_CONNECTION".
When I filter the logs in secops ingestion, I currently use:
OR log_id("loadbalancing.googleapis.com/external_regional_requests")
OR log_id("requests")
Is this filter sufficient to capture all relevant Cloud Armor activity (such as allowed or blocked requests),
or are there additional log_id values that I should include to ensure full coverage of Cloud Armor logs in Chronicle?
Thank you!
