Skip to content

Commit 2ea6e5c

Browse files
Merge pull request #312430 from TwistedAlex/docs-editor/connect-google-cloud-platform-1772215618
Update connect-google-cloud-platform.md
2 parents 181e90b + 490fc1f commit 2ea6e5c

1 file changed

Lines changed: 96 additions & 3 deletions

File tree

articles/sentinel/connect-google-cloud-platform.md

Lines changed: 96 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ With the **GCP Pub/Sub** connectors, based on our [Codeless Connector Framework
2323

2424
- The **Google Cloud Platform (GCP) Security Command Center connector** collects findings from Google Security Command Center, a robust security and risk management platform for Google Cloud. Analysts can view these findings to gain insights into the organization's security posture, including asset inventory and discovery, detections of vulnerabilities and threats, and risk mitigation and remediation.
2525

26+
- The **Google Kubernetes Engine connector** collects Google Kubernetes Engine (GKE) Logs. Analysts can monitor these logs to track cluster activity, workload behavior, and security events, allowing analysts to monitor Kubernetes workloads, analyze performance, and detect potential threats across GKE clusters.
27+
2628
## Prerequisites
2729

2830
Before you begin, verify that you have the following:
@@ -64,6 +66,8 @@ You can set up the environment in one of two ways:
6466
6567
### GCP Authentication Setup
6668

69+
Required for all GCP connectors.
70+
6771
# [Terraform API Setup](#tab/terraform)
6872

6973
1. Open [GCP Cloud Shell](https://cloud.google.com/shell/).
@@ -183,7 +187,9 @@ For more information about granting access in Google Cloud Platform, see [Manage
183187

184188
The instructions in this section are for using the Microsoft Sentinel **GCP Pub/Sub Audit Logs** connector.
185189

186-
See [the instructions in the next section](#gcp-security-command-center-setup) for using the Microsoft Sentinel **GCP Pub/Sub Security Command Center** connector.
190+
See [GCP Security Command Center setup](#gcp-security-command-center-setup) for using the Microsoft Sentinel **GCP Pub/Sub Security Command Center** connector.
191+
192+
See [GKE Logs setup](#google-kubernetes-engine-connector-setup) for using the Microsoft Sentinel **Google Kubernetes Engine** connector.
187193

188194
# [Terraform API Setup](#tab/terraform)
189195

@@ -277,6 +283,8 @@ The instructions in this section are for using the Microsoft Sentinel **GCP Pub/
277283
278284
See [the instructions in the previous section](#gcp-audit-logs-setup) for using the Microsoft Sentinel **GCP Pub/Sub Audit Logs** connector.
279285
286+
See [GKE Logs setup](#google-kubernetes-engine-connector-setup) for using the Microsoft Sentinel **Google Kubernetes Engine** connector.
287+
280288
#### Configure continuous export of findings
281289
282290
Follow the instructions in the Google Cloud documentation to [**configure Pub/Sub exports**](https://cloud.google.com/security-command-center/docs/how-to-export-data#configure-pubsub-exports) of future SCC findings to the GCP Pub/Sub service.
@@ -285,6 +293,51 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
285293
286294
1. When asked to select a Pub/Sub topic where you want to export your findings, follow the instructions above to [create a new topic](#create-a-publishing-topic).
287295
296+
### Google Kubernetes Engine Connector Setup
297+
298+
The instructions in this section are for using the Microsoft Sentinel **Google Kubernetes Engine** connector.
299+
300+
See [GCP Security Command Center setup](#gcp-security-command-center-setup) for using the Microsoft Sentinel **GCP Pub/Sub Security Command Center** connector.
301+
302+
See [GCP Audit Logs setup](#gcp-audit-logs-setup) for using the Microsoft Sentinel **GCP Pub/Sub Audit Logs** connector.
303+
304+
# [Terraform API Setup](#tab/terraformgke)
305+
306+
1. Copy the Terraform audit log setup script provided by Microsoft Sentinel from the Sentinel GitHub repository into a different folder in your GCP Cloud Shell environment.
307+
308+
1. Open the Terraform [GoogleKubernetesEngineLogSetup script](https://github.com/Azure/Azure-Sentinel/blob/master/DataConnectors/GCP/Terraform/sentinel_resources_creation/GoogleKubernetesEngineLogsSetup/GoogleKubernetesEngineLogSetup.tf) file and copy its contents.
309+
310+
1. Create another directory in your Cloud Shell environment, enter it, and create a new blank file.
311+
```bash
312+
mkdir {other-directory-name} && cd {other-directory-name} && touch gkelog.tf
313+
```
314+
315+
1. Open *gkelog.tf* in the Cloud Shell editor and paste the contents of the script file into it.
316+
317+
1. Initialize Terraform in the new directory by typing the following command in the terminal:
318+
```bash
319+
terraform init
320+
```
321+
322+
1. When you receive the confirmation message that Terraform was initialized, run the script by typing the following command in the terminal:
323+
```bash
324+
terraform apply
325+
```
326+
327+
To ingest logs from an entire organization using a single Pub/Sub, type:
328+
329+
```bash
330+
terraform apply -var="organization-id= {organizationId} "
331+
```
332+
333+
1. When asked if you want to create the resources listed, type *yes*.
334+
335+
When the output from the script is displayed, save the resources parameters for later use.
336+
337+
Wait five minutes before moving to the next step.
338+
339+
---
340+
288341
## Set up the GCP Pub/Sub connector in Microsoft Sentinel
289342
290343
# [GCP Audit Logs](#tab/auditlogs)
@@ -305,7 +358,7 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
305358
306359
:::image type="content" source="media/connect-google-cloud-platform/add-new-collector.png" alt-text="Screenshot of GCP connector configuration" lightbox="media/connect-google-cloud-platform/add-new-collector.png":::
307360
308-
1. In the **Connect a new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
361+
1. In the **Connect new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
309362
310363
:::image type="content" source="media/connect-google-cloud-platform/new-collector-dialog.png" alt-text="Screenshot of new collector side panel.":::
311364
@@ -329,12 +382,36 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
329382
330383
:::image type="content" source="media/connect-google-cloud-platform/add-new-collector.png" alt-text="Screenshot of GCP connector configuration." lightbox="media/connect-google-cloud-platform/add-new-collector.png":::
331384
332-
1. In the **Connect a new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
385+
1. In the **Connect new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
333386
334387
:::image type="content" source="media/connect-google-cloud-platform/new-collector-dialog.png" alt-text="Screenshot of new collector side panel.":::
335388
336389
1. Make sure that the values in all the fields match their counterparts in your GCP project (the values in the screenshot are samples, not literals), and select **Connect**.
337390
391+
# [GKE Logs](#tab/gkelogs)
392+
393+
1. Open the [Azure portal](https://portal.azure.com/) and navigate to the **Microsoft Sentinel** service.
394+
395+
1. In the **Content hub**, in the search bar, type *Google Cloud Platform Audit Logs*.
396+
397+
1. Install the **Google Kubernetes Engine** solution.
398+
399+
1. Select **Data connectors**, and in the search bar, type *Google Kubernetes Engine (via Codeless Connector Framework)*.
400+
401+
1. Select the **Google Kubernetes Engine (via Codeless Connector Framework)** connector.
402+
403+
1. In the details pane, select **Open connector page**.
404+
405+
1. In the **Configuration** area, select **Add new collector**.
406+
407+
:::image type="content" source="media/connect-google-cloud-platform/add-new-collector.png" alt-text="Screenshot of GCP connector configuration" lightbox="media/connect-google-cloud-platform/add-new-collector.png":::
408+
409+
1. In the **Connect new collector** panel, type the resource parameters you created when you [created the GCP resources](#set-up-gcp-environment).
410+
411+
:::image type="content" source="media/connect-google-cloud-platform/new-collector-dialog.png" alt-text="Screenshot of new collector side panel.":::
412+
413+
1. Make sure that the values in all the fields match their counterparts in your GCP project (the values in the screenshot are samples, not literals), and select **Connect**.
414+
338415
---
339416
340417
## Verify that the GCP data is in the Microsoft Sentinel environment
@@ -355,10 +432,26 @@ Follow the instructions in the Google Cloud documentation to [**configure Pub/Su
355432
| take 10
356433
```
357434
435+
# [GKE Logs](#tab/gkelogs)
436+
437+
```kusto
438+
GKEAudit
439+
| take 10
440+
```
441+
358442
---
359443
360444
1. Enable the [health feature](enable-monitoring.md) for data connectors.
361445
446+
## Troubleshooting
447+
1. "Error 409: Requested entity already exists" When running terraform scripts: import those existing GCP resources into Terraform state so Terraform manages them instead of trying to recreate them.
448+
For example, with error message: "Error creating WorkloadIdentityPool: googleapi: Error 409: Requested entity already exists", please find the pool ID and project ID, run:
449+
```bash
450+
terraform import google_iam_workload_identity_pool.<POOL_RESOURCE_NAME> projects/<PROJECT_ID>/locations/global/workloadIdentityPools/<POOL_ID>
451+
```
452+
453+
---
454+
362455
## Next steps
363456
In this article, you learned how to ingest GCP data into Microsoft Sentinel using the GCP Pub/Sub connectors. To learn more about Microsoft Sentinel, see the following articles:
364457

0 commit comments

Comments
 (0)