The use case is to drop the logs matching metadata.log_type = “WORKSPACE_ACTIVITY” AND metadata.product_name = “chrome”.
Is there any other option besides Parser Extensions?
From what I read, parser extensions are applied to the raw events. Is that right, or is there a method where I can also use UDM events on the normalized events to build the drop filter?
Best answer by cmmartin_google
The drop{} filter is more like an exit function in that the parser exits running gracefully, but the raw log itself will still be in the platform.
You can drop logs in Google Chronicle by using Parser Extensions to manipulate UDM fields. The key is to set conditions in your parser extension so that unwanted logs either map to null values or are excluded entirely before they reach the Unified Data Model (UDM). - Parser Extension parser Extensions let you override or extend the default parser behavior for specific log sources. - By customizing UDM field mappings, you can remove, nullify, or redirect values so that logs you don’t want are effectively dropped.
I wasn't aware of this new function. I had a read through the docs and tried to configure the Bindplane integration without success. I will discuss it further with Bindplane Support. Thanks for pointing me to this resource.
During the preview the recommended approach is to use the BindPlane OP UX, either the on-prem or the SaaS instance (of which your Google SecOps license entitles you access).
As to the pipeline, you would apply a match against the raw log data, e.g., use the json extract processor with a transform and drop a specific key, or you can write a regex match.
I’m in the process of confirming whether or not we have access to this feature in Bindplane, as I read some previous posts where it was stated that only Ent+ customers can use this.
So even in this integration, I can’t work directly with the UDM data and apply the filter after normalization. I must only work with the raw events. Is my understanding correct?
The Data Pipeline feature mentioned if, I think, for Enterprise and Enterprise+ SecOps users.
You *can’t* filter on UDM values as this feature runs ahead of normalization, but in your example the original log source is JSON and has a clean and reliable key name you can use for filtering confidently.
Understood. The Chrome events do not have a field for the product name, and from what I’ve seen in the parser, it deduces the product based on the event names. But that’s fine; I just wanted to know how this works. Thanks for your help!