You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-google-cloud-platform.md
+96-3Lines changed: 96 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,8 @@ With the **GCP Pub/Sub** connectors, based on our [Codeless Connector Framework
23
23
24
24
- The **Google Cloud Platform (GCP) Security Command Center connector** collects findings from Google Security Command Center, a robust security and risk management platform for Google Cloud. Analysts can view these findings to gain insights into the organization's security posture, including asset inventory and discovery, detections of vulnerabilities and threats, and risk mitigation and remediation.
25
25
26
+
- The **Google Kubernetes Engine connector** collects Google Kubernetes Engine (GKE) Logs. Analysts can monitor these logs to track cluster activity, workload behavior, and security events, allowing analysts to monitor Kubernetes workloads, analyze performance, and detect potential threats across GKE clusters.
27
+
26
28
## Prerequisites
27
29
28
30
Before you begin, verify that you have the following:
@@ -64,6 +66,8 @@ You can set up the environment in one of two ways:
64
66
65
67
### GCP Authentication Setup
66
68
69
+
Required for all GCP connectors.
70
+
67
71
# [Terraform API Setup](#tab/terraform)
68
72
69
73
1. Open [GCP Cloud Shell](https://cloud.google.com/shell/).
@@ -183,7 +187,9 @@ For more information about granting access in Google Cloud Platform, see [Manage
183
187
184
188
The instructions in this section are for using the Microsoft Sentinel **GCP Pub/Sub Audit Logs** connector.
185
189
186
-
See [the instructions in the next section](#gcp-security-command-center-setup) for using the Microsoft Sentinel **GCP Pub/Sub Security Command Center** connector.
190
+
See [GCP Security Command Center setup](#gcp-security-command-center-setup) for using the Microsoft Sentinel **GCP Pub/Sub Security Command Center** connector.
191
+
192
+
See [GKE Logs setup](#google-kubernetes-engine-connector-setup) for using the Microsoft Sentinel **Google Kubernetes Engine** connector.
187
193
188
194
# [Terraform API Setup](#tab/terraform)
189
195
@@ -277,6 +283,8 @@ The instructions in this section are for using the Microsoft Sentinel **GCP Pub/
277
283
278
284
See [the instructions in the previous section](#gcp-audit-logs-setup) for using the Microsoft Sentinel **GCP Pub/Sub Audit Logs** connector.
279
285
286
+
See [GKE Logs setup](#google-kubernetes-engine-connector-setup) for using the Microsoft Sentinel **Google Kubernetes Engine** connector.
287
+
280
288
#### Configure continuous export of findings
281
289
282
290
Follow the instructions in the Google Cloud documentation to [**configure Pub/Sub exports**](https://cloud.google.com/security-command-center/docs/how-to-export-data#configure-pubsub-exports) of future SCC findings to the GCP Pub/Sub service.
@@ -285,6 +293,51 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
285
293
286
294
1. When asked to select a Pub/Sub topic where you want to export your findings, follow the instructions above to [create a new topic](#create-a-publishing-topic).
287
295
296
+
### Google Kubernetes Engine Connector Setup
297
+
298
+
The instructions in this section are for using the Microsoft Sentinel **Google Kubernetes Engine** connector.
299
+
300
+
See [GCP Security Command Center setup](#gcp-security-command-center-setup) for using the Microsoft Sentinel **GCP Pub/Sub Security Command Center** connector.
301
+
302
+
See [GCP Audit Logs setup](#gcp-audit-logs-setup) for using the Microsoft Sentinel **GCP Pub/Sub Audit Logs** connector.
303
+
304
+
# [Terraform API Setup](#tab/terraformgke)
305
+
306
+
1. Copy the Terraform audit log setup script provided by Microsoft Sentinel from the Sentinel GitHub repository into a different folder in your GCP Cloud Shell environment.
307
+
308
+
1. Open the Terraform [GoogleKubernetesEngineLogSetup script](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/GCP/Terraform/sentinel_resources_creation/GoogleKubernetesEngineLogsSetup/GoogleKubernetesEngineLogSetup.tf) file and copy its contents.
309
+
310
+
1. Create another directory in your Cloud Shell environment, enter it, and create a new blank file.
311
+
```bash
312
+
mkdir {other-directory-name} && cd {other-directory-name} && touch gkelog.tf
313
+
```
314
+
315
+
1. Open *gkelog.tf* in the Cloud Shell editor and paste the contents of the script file into it.
316
+
317
+
1. Initialize Terraform in the new directory by typing the following command in the terminal:
318
+
```bash
319
+
terraform init
320
+
```
321
+
322
+
1. When you receive the confirmation message that Terraform was initialized, run the script by typing the following command in the terminal:
323
+
```bash
324
+
terraform apply
325
+
```
326
+
327
+
To ingest logs from an entire organization using a single Pub/Sub, type:
1. When asked if you want to create the resources listed, type *yes*.
334
+
335
+
When the output from the script is displayed, save the resources parameters for later use.
336
+
337
+
Wait five minutes before moving to the next step.
338
+
339
+
---
340
+
288
341
## Set up the GCP Pub/Sub connector in Microsoft Sentinel
289
342
290
343
# [GCP Audit Logs](#tab/auditlogs)
@@ -305,7 +358,7 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
305
358
306
359
:::image type="content" source="media/connect-google-cloud-platform/add-new-collector.png" alt-text="Screenshot of GCP connector configuration" lightbox="media/connect-google-cloud-platform/add-new-collector.png":::
307
360
308
-
1. In the **Connect a new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
361
+
1. In the **Connect new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
309
362
310
363
:::image type="content" source="media/connect-google-cloud-platform/new-collector-dialog.png" alt-text="Screenshot of new collector side panel.":::
311
364
@@ -329,12 +382,36 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
329
382
330
383
:::image type="content" source="media/connect-google-cloud-platform/add-new-collector.png" alt-text="Screenshot of GCP connector configuration." lightbox="media/connect-google-cloud-platform/add-new-collector.png":::
331
384
332
-
1. In the **Connect a new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
385
+
1. In the **Connect new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
333
386
334
387
:::image type="content" source="media/connect-google-cloud-platform/new-collector-dialog.png" alt-text="Screenshot of new collector side panel.":::
335
388
336
389
1. Make sure that the values in all the fields match their counterparts in your GCP project (the values in the screenshot are samples, not literals), and select **Connect**.
337
390
391
+
# [GKE Logs](#tab/gkelogs)
392
+
393
+
1. Open the [Azure portal](https://portal.azure.com/) and navigate to the **Microsoft Sentinel** service.
394
+
395
+
1. In the **Content hub**, in the search bar, type *Google Cloud Platform Audit Logs*.
396
+
397
+
1. Install the **Google Kubernetes Engine** solution.
398
+
399
+
1. Select **Data connectors**, and in the search bar, type *Google Kubernetes Engine (via Codeless Connector Framework)*.
1. In the details pane, select **Open connector page**.
404
+
405
+
1. In the **Configuration** area, select **Add new collector**.
406
+
407
+
:::image type="content" source="media/connect-google-cloud-platform/add-new-collector.png" alt-text="Screenshot of GCP connector configuration" lightbox="media/connect-google-cloud-platform/add-new-collector.png":::
408
+
409
+
1. In the **Connect new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
410
+
411
+
:::image type="content" source="media/connect-google-cloud-platform/new-collector-dialog.png" alt-text="Screenshot of new collector side panel.":::
412
+
413
+
1. Make sure that the values in all the fields match their counterparts in your GCP project (the values in the screenshot are samples, not literals), and select **Connect**.
414
+
338
415
---
339
416
340
417
## Verify that the GCP data is in the Microsoft Sentinel environment
@@ -355,10 +432,26 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
355
432
| take 10
356
433
```
357
434
435
+
# [GKE Logs](#tab/gkelogs)
436
+
437
+
```kusto
438
+
GKEAudit
439
+
| take 10
440
+
```
441
+
358
442
---
359
443
360
444
1. Enable the [health feature](enable-monitoring.md) for data connectors.
361
445
446
+
## Troubleshooting
447
+
1. "Error 409: Requested entity already exists" When running terraform scripts: import those existing GCP resources into Terraform state so Terraform manages them instead of trying to recreate them.
448
+
For example, with error message: "Error creating WorkloadIdentityPool: googleapi: Error 409: Requested entity already exists", please find the pool ID and project ID, run:
In this article, you learned how to ingest GCP data into Microsoft Sentinel using the GCP Pub/Sub connectors. To learn more about Microsoft Sentinel, see the following articles:
0 commit comments