Skip to main content
Solved

How can I drop logs using Parser Extensions and UDM fields?

  • December 8, 2025
  • 8 replies
  • 40 views

ar3diu
Forum|alt.badge.img+8

The use case is to drop the logs matching metadata.log_type = “WORKSPACE_ACTIVITY” AND metadata.product_name = “chrome”.

  1. Is there any other option besides Parser Extensions?
  2. From what I read, parser extensions are applied to the raw events. Is that right, or is there a method where I can also use UDM events on the normalized events to build the drop filter?

Best answer by cmmartin_google

The drop{} filter is more like an exit function in that the parser exits running gracefully, but the raw log itself will still be in the platform.

If the request is to completely remove a log from being indexed into the platform, you would need to use the new preview https://docs.cloud.google.com/chronicle/docs/ingestion/data-processing-pipeline feature

8 replies

Absonny00-coder
Forum|alt.badge.img+2

You can drop logs in Google Chronicle by using Parser Extensions to manipulate UDM fields. The key is to set conditions in your parser extension so that unwanted logs either map to null values or are excluded entirely before they reach the Unified Data Model (UDM). 
- Parser Extension parser Extensions let you override or extend the default parser behavior for specific log sources.  
- By customizing UDM field mappings, you can remove, nullify, or redirect values so that logs you don’t want are effectively dropped.  


cmmartin_google
Staff
Forum|alt.badge.img+11

The drop{} filter is more like an exit function in that the parser exits running gracefully, but the raw log itself will still be in the platform.

If the request is to completely remove a log from being indexed into the platform, you would need to use the new preview https://docs.cloud.google.com/chronicle/docs/ingestion/data-processing-pipeline feature


ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • December 8, 2025

Thanks, ​@cmmartin_google !

I wasn't aware of this new function. I had a read through the docs and tried to configure the Bindplane integration without success. I will discuss it further with Bindplane Support. Thanks for pointing me to this resource.


ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • December 8, 2025

@cmmartin_google Do you have any examples with filter processors based on UDM fields?

Quite hard to figure out from these examples.

 

 


cmmartin_google
Staff
Forum|alt.badge.img+11

During the preview the recommended approach is to use the BindPlane OP UX, either the on-prem or the SaaS instance (of which your Google SecOps license entitles you access).

 

As to the pipeline, you would apply a match against the raw log data, e.g., use the json extract processor with a transform and drop a specific key, or you can write a regex match.


ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • December 8, 2025

@cmmartin_google 

I’m in the process of confirming whether or not we have access to this feature in Bindplane, as I read some previous posts where it was stated that only Ent+ customers can use this.

So even in this integration, I can’t work directly with the UDM data and apply the filter after normalization. I must only work with the raw events. Is my understanding correct?


cmmartin_google
Staff
Forum|alt.badge.img+11

The Google Edition license of BindPlane would be available to all SecOps customers - https://docs.cloud.google.com/chronicle/docs/ingestion/use-bindplane-agent#bindplane_google_edition - this gives you access to the BindPlane OP. 

 

The Data Pipeline feature mentioned if, I think, for Enterprise and Enterprise+ SecOps users.

 

You *can’t* filter on UDM values as this feature runs ahead of normalization, but in your example the original log source is JSON and has a clean and reliable key name you can use for filtering confidently.


ar3diu
Forum|alt.badge.img+8
  • Author
  • Silver 2
  • December 9, 2025

Understood. The Chrome events do not have a field for the product name, and from what I’ve seen in the parser, it deduces the product based on the event names. But that’s fine; I just wanted to know how this works. Thanks for your help!