Google Cloud Platform collector
Configuration requirements
To run this collector, there are some configurations detailed below that you need to take into account.
Configuration | Details |
---|---|
GCP console access |
|
Permissions |
|
Logging services | The following features have been configured:
|
Enable SCC |
|
Credentials |
|
Refer to the Vendor setup section to know more about these configurations.
Overview
Google Cloud Platform (GCP) lets you build, deploy, and scale applications, websites, and services on the same infrastructure as Google. This collector provides the possibility to integrate GCP with the Devo Platform, making it easy to query and analyze GCP event data, view it in the pre-configured Activeboards, or customize them to suit your needs.
This collector is a generic Pub/Sub collector that collects data from any source using Pub/Sub in the logging service. Additionally, it also collects data from Netskope, which uses Pub/Sub Lite.
Devo’s GCP Collector enables customers to retrieve event data stored in GCP via Google Cloud APIs, such as audit logs, Security Command Center findings, networking, load balancing, and more, available via Pub/Sub into Devo. This allows IT and Cybersecurity teams to query, correlate, analyze, and visualize data at a petabyte scale, helping them make the most impactful decisions.
1.x to 2.x migrating guide
If you are migrating from v1.x to v2.x, you can find a complete guide in this article.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Data sources
ID | Data Source | Description | API Endpoint | Collector Service Name | Devo Table | Available from release |
---|---|---|---|---|---|---|
1 | Logging (formerly StackDriver) | Cloud Logging is a fully managed service that allows you to store, search, analyze, monitor, and alert on logging data and events from Google Cloud and Amazon Web Services. |
|
|
This service allows you to select two different autodispatcher system. This is the structure for the one based on
This service allows you to select two different autodispatcher system. This is the structure for the one based on |
|
3 | Security Command Center Findings | Security Command Center is Google Cloud's centralized vulnerability and threat reporting service. |
|
|
|
|
4 | Netskope Web Transactions | Netskope Web Transactions provide detailed visibility into web activity, including user behaviors, threats, and policy violations. This enables organizations to enforce security policies and protect against data exfiltration. |
|
|
|
|
For more information on how the events are parsed, visit our page.
Flattening preprocessing
This collector does not implement flattening
Vendor setup
To enable the collection in the vendor setup, there are some minimal requirements to follow:
GCP console access: You should have credentials to access the GCP console.
Owner or Administrator permissions within the GCP console.
Enable the Logging service
Here you will find how to enable the Logging service (formerly Stackdriver)
Logging Service Overview
GCP centralizes all the monitoring information from all services in the cloud catalog that is inside the service named after Logging.
Some information is enabled by default and free of charge. Other information, that in case of activating its generation, will concur some costs, so it must be enabled manually. In both cases, the generated information (messages) will arrive at the Logging service.
The Logging service has different ways of exporting the information stored and structured in messages. In this case, it’s being used by another GCP service called PubSub, basically, this service will contain a topic object that will receive a filtered set of messages from the Logging service, then the GCP collector will retrieve all those messages from the topic object using a subscription (in the pull mode).
To facilitate the retrieve is recommended to split the source message using different topic objects, you can split it by resource type, region, project ID, and so on:
Configuration of the Logging service
Here you will find which features you need to configure to receive events from both services:
GCP Project: You need to have a GCP Project in the console to be able to receive data.
Service account: The Service account is a Google service that allows.
GCP Pub/Sub: It is the queue from which the events will be downloaded, it is necessary to create a Topic and a Subscription.
Sink (optional): The sink is a filter to receive only the type of events that you want.
Here you will find the steps to configure each feature:
Enable the Security Command Center Service (SCC)
Events can be retrieved differently depending on the source:
SCC Audit logs: Events obtained through the Logging service.
SCC Findings: Events obtained from external services.
Enable the Security Command Center (SCC) Audit logs
The events will be obtained through the centralized Logging service. Refer to the Configuration of the Logging service section to know how to configure it.
Here you will find the steps to filter this type of event:
| Action | Steps |
---|---|---|
1 | Activate Security Command Center service | In order to receive this type of event, it is necessary to have the Security Command Center service activated. Refer to the Security Command Center Quickstart video from the Google guide. |
2 | Setting up a new topic | Refer to the Configuration of the Logging section to know how to do it. |
3 | Setting up a Pub/Sub | Refer to the Configuration of the Logging section to know how to do it. |
4 | Setting up a sink | Refer to the Configuration of the Logging section to know how to do it. |
Enable the Security Command Center (SCC) Findings
These events are obtained from the Security Command Center service and are injected directly into the Pub/Sub without going through the Logging service.
| Action | Steps |
---|---|---|
1 | Configure Identity and Access Management (IAM) roles. | Refer to the official Google guide in which additional configurations are described. |
2 | Activate the Security Command Center API. | |
3 | Setting up a Pub/Sub topic. | |
4 | Creating a Notification configuration. |
How to Enable Netskope Web Transactions
| Action | Steps |
---|---|---|
1 | Configure IAM Roles | Ensure the necessary IAM permissions for Pub/Sub access. Assign the required roles to the Service Account. |
2 | Activate Netskope API | Enable the Netskope API in the Netskope admin console. |
3 | Create a Pub/Sub Topic | In the GCP console, go to Pub/Sub, create a new Topic, and ensure Add a default subscription is checked. |
4 | Set Up Subscription | Once the Topic is created, navigate to Subscriptions, edit the subscription properties as needed, and save. |
5 | Configure Collector | Add the correct Subscription ID and Service Account credentials (Base64 encoded) to the collector configuration. |
For additional details, refer to Netskope's official documentation.
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
Setting | Details |
---|---|
| This param allows you to assign a custom name for identifying the environment of the infrastructure. |
| The name of the GCP project. Refer to the Configuration of the Logging service section to know got to get this value. |
| The service account credentials in |
| The ID of the Pub/Sub subscription. Refer to the Configuration of the Logging service section to know got to get this value. |
Accepted authentication methods
Depending on how did you obtain the credentials, you will have to either fill or delete the following properties on the JSON credentials
configuration block.
| Authentication method | Project ID | Base64 credentials | File credentials | Available on |
---|---|---|---|---|---|
1 | Service account with Base64. | Required | Required |
|
|
2 | Service account with the file credentials. | Required |
| Required |
|
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Collector services detail
This section is intended to explain how to proceed with specific actions for services.
Custom Service
This is the only service that GCP has. Multiple custom services can be created to ingest data from different pub/sub sinks, however, the only data sources supported by this collector are:
Logging events: The previous sections Running the data collector explain how to configure a Logging service but more custom logging services can be created with different Pub/Sub filters.
SCC findings events: This service is also a custom service configured with data coming from a source external to the Logging service.
Netskope web transaction: This service is also a custom service configured with data coming from a source external to the Logging service.
Collector operations
This section is intended to explain how to proceed with specific operations of this collector.
Changelog
Version 2.x.x
Release | Released on | Release Type | Details | Recommendations |
---|---|---|---|---|
| Feb 24, 2025 | IMPROVEMENT | Improvements:
|
|
| Feb 12, 2025 | IMPROVEMENTNEW FEATURE | Improvements:
|
|
Version 1.x.x
Release | Released on | Release type | Details | Recommendations |
---|---|---|---|---|
| Dec 9, 2024 | IMPROVEMENTS Bug Fixes | Bug Fixes
Improvements
|
|
| Jun 21, 2024 | IMPROVEMENTS | Improvements
|
|
| Apr 29, 2024 | IMPROVEMENTS | Improvements
|
|
| Sep 25, 2023 | IMPROVEMENTSNEW FEATURES | Improvements
New features
|
|
| Aug 3, 2023 | IMPROVEMENTS | Improvements
|
|
| Apr 13, 2023 | IMPROVEMENTSBUG FIXING | Improvements
Bug fixing
|
|
|
| - | - |
|
|
| IMPROVEMENTSBUG FIXING | Improvements
Bug fixing
|
|
| Jun 1, 2022 | IMPROVEMENT | Improvements
|
|
| May 23, 2022 | IMPROVEMENT | Improvements
|
|
| Apr 12, 2022 | IMPROVEMENT VULNS
| Improvements
Vulnerabilities mitigated
|
|
| Mar 8, 2022 | IMPROVEMENT | Improvements
|
|
| Mar 1, 2022 | IMPROVEMENT | Improvements
|
|