Hello guys,
Context :
I'm working on some custom parsers for some logs that cannot be made native-SecOps-parsers-compliant. Once the parser is done, I need to validate it against a large number of logs. In order to do so, I export a few tens of thousand of raw logs from the previous SIEM and ingest them through the ingestion API. These raw logs can spread over several days to ensure a sufficient number of them.
Problem :
Even though the default "Ingestion dashboard" lists the correct number of log lines ingested (48976), I can only see 1200 lines in raw log search. They are all from today, at the correct time from the payload. I see no previous events even though I ingested raw logs from the last 30 days or so.
Where did my logs go ?
Am I doing something wrong or missing some SecOps concept ? Maybe I cannot ingest "too old" logs ? If so, what is the "too old" threshold ?
NB:
- I have no other choice than manually ingesting logs from the previous SIEM to get them into Chronicle and work on the parser, no avenue to setup a direct and continuous collection.
- When initially importing a couple thousands (5000-10000) logs to start parsing, I don't have this issue, they all appear in raw log search, at the time of ingestion (since not parsed yet)
- From the Ingestion Dashboard, I can see that every line from the "validation logs" is correctly parsed, the Parsing Error count, etc, all display 0
Thanks in advance for your inputs 🙂