Collect Cisco eStreamer logs
This document explains how to ingest Cisco eStreamer logs to Google Security Operations using Bindplane. The parser extracts fields from the SYSLOG messages in key-value format, using grok to parse the initial message and kv to handle the key-value data. It then maps these extracted fields to the Unified Data Model (UDM), handling various data types and enriching the event with metadata like event type based on the presence of principal and target information.
Before you begin
Make sure you have the following prerequisites:
- A Google SecOps instance
- A Windows Server 2012 SP2 or later, or Linux host with
systemd - If running behind a proxy, ensure firewall ports are open per the Bindplane agent requirements
- Privileged access to the Cisco Firepower Management Center (FMC)
- A Linux system to run the eNcore CLI client
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
- Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
- Copy and save the Customer IDfrom the Organization Detailssection.
Install Bindplane agent
Install the Bindplane agent on your Windows or Linux operating system according to the following instructions.
Windows installation
- Open the Command Promptor PowerShellas an administrator.
-
Run the following command:
msiexec / i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" / quiet
Linux installation
- Open a terminal with root or sudo privileges.
-
Run the following command:
sudo sh -c " $( curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh ) " install_unix.sh
Additional installation resources
For additional installation options, consult the installation guide .
Configure the Bindplane agent to ingest Syslog and send to Google SecOps
- Access the configuration file:
- Locate the
config.yamlfile. Typically, it's in the/opt/observiq-otel-collector/directory on Linux or `C:\Program Files\observIQ OpenTelemetry Collector` directory on Windows. - Open the file using a text editor (for example,
nano,vi, or Notepad).
- Locate the
-
Edit the
config.yamlfile as follows:receivers : udplog : # Replace the port and IP address as required listen_address : "0.0.0.0:514" exporters : chronicle/chronicle_w_labels : compression : gzip # Adjust the path to the credentials file you downloaded in Step 1 creds_file_path : '/path/to/ingestion-authentication-file.json' # Replace with your actual customer ID from Step 2 customer_id : YOUR_CUSTOMER_ID endpoint : malachiteingestion-pa.googleapis.com # Add optional ingestion labels for better organization log_type : 'CISCO_ESTREAMER' raw_log_field : body ingestion_labels : service : pipelines : logs/source0__chronicle_w_labels-0 : receivers : - udplog exporters : - chronicle/chronicle_w_labels- Replace the port and IP address as required in your infrastructure.
- Replace
<customer_id>with the actual customer ID. - Update
/path/to/ingestion-authentication-file.jsonto the path where the authentication file was saved in the Get Google SecOps ingestion authentication file section.
Restart the Bindplane agent to apply the changes
-
To restart the Bindplane agent in Linux, run the following command:
sudo systemctl restart bindplane-agent -
To restart the Bindplane agent in Windows, you can either use the Servicesconsole or enter the following command:
net stop BindPlaneAgent && net start BindPlaneAgent
Configure Syslog forwarding on Cisco eStreamer
Configure eStreamer on Firepower Management Center
- Sign in to the Firepower Management Center.
- Go to System > Integration > eStreamer.
- Click eStreamerto access the eStreamer Event Configuration.
- Select the check boxes next to the types of events you want to capture:
- Intrusion Events: For intrusion detection events
- Intrusion Event Packet Data: For packet captures associated with intrusion events
- Connection Events: For network connection data
- Security Intelligence Events: For threat intelligence data
- File Events: For file analysis events
- Malware Events: For malware detection events
- Click Save.
Create eStreamer Client
- In the eStreamerpage, click Create Client.
- Provide the following configuration details:
- Hostname: Enter the IP address of the Linux system where eNcore client will run.
- Password: Enter a password to encrypt the certificate file.
- Click Save.
- Download the generated PKCS12 certificate file and transfer it to your eNcore client system.
Install and Configure eNcore CLI Client
- On your Linux system, download the eStreamer eNcore CLI client from Cisco.
-
Extract the eNcore package:
tar -xzf eStreamer-eNcore-*.tar.gz cd eStreamer-eNcore-* -
Run the setup script:
./encore.sh setup -
When prompted, choose the output format for key-value pairs (compatible with SIEM systems).
-
Enter the FMC IP address and the PKCS12 certificate password.
-
Configure the
estreamer.conffile to output syslog messages to your Bindplane agent:- Open the
estreamer.conffile in a text editor. -
Locate the outputters section and configure it to send syslog to your Bindplane agent:
{ "handler" : { "outputters" : [ { "name" : "syslog" , "adapter" : "kvpair" , "enabled" : true , "stream" : { "uri" : "udp://BINDPLANE_AGENT_IP:514" } } ] } }
- Open the
-
Replace
BINDPLANE_AGENT_IPwith the IP address of your Bindplane agent.
Start eNcore Client
-
Test the connection in foreground mode:
./encore.sh foreground -
Once verified, start eNcore as a background service:
./encore.sh start
UDM Mapping Table
| Log Field | UDM Mapping | Logic |
|---|---|---|
act
|
security_result.action_details
|
The value of act
from the raw log is assigned to this field. |
act
|
security_result.action
|
If the value of act
is "Allow" (case-insensitive), then the value "ALLOW" is assigned to this field. |
app
|
network.http.user_agent
|
The value of app
(renamed as requestClientApplication
in the parser) from the raw log is assigned to this field. |
blockLength
|
security_result.detection_fields[].key
|
The string "blocklength" is assigned to this field. |
blockLength
|
security_result.detection_fields[].value
|
The value of blockLength
from the raw log, converted to a string, is assigned to this field. |
blockType
|
security_result.detection_fields[].key
|
The string "blockType" is assigned to this field. |
blockType
|
security_result.detection_fields[].value
|
The value of blockType
from the raw log, converted to a string, is assigned to this field. |
bytesIn
|
network.received_bytes
|
The value of bytesIn
from the raw log is assigned to this field and converted to an unsigned integer. |
bytesOut
|
network.sent_bytes
|
The value of bytesOut
from the raw log is assigned to this field and converted to an unsigned integer. |
cat
|
security_result.category_details
|
The value of cat
from the raw log is assigned to this field. |
cs1
|
security_result.detection_fields[].value
|
The value of cs1
from the raw log is assigned to this field. |
cs1Label
|
security_result.detection_fields[].key
|
The value of cs1Label
from the raw log is assigned to this field. |
cs2
|
security_result.detection_fields[].value
|
The value of cs2
from the raw log is assigned to this field. |
cs2Label
|
security_result.detection_fields[].key
|
The value of cs2Label
from the raw log is assigned to this field. |
cs3
|
security_result.detection_fields[].value
|
The value of cs3
from the raw log is assigned to this field. |
cs3Label
|
security_result.detection_fields[].key
|
The value of cs3Label
from the raw log is assigned to this field. |
cs4
|
security_result.detection_fields[].value
|
The value of cs4
from the raw log is assigned to this field. |
cs4Label
|
security_result.detection_fields[].key
|
The value of cs4Label
from the raw log is assigned to this field. |
cs5
|
security_result.detection_fields[].value
|
The value of cs5
from the raw log is assigned to this field. |
cs5Label
|
security_result.detection_fields[].key
|
The value of cs5Label
from the raw log is assigned to this field. |
cs6
|
security_result.detection_fields[].value
|
The value of cs6
from the raw log is assigned to this field. |
cs6
|
security_result.rule_id
|
The value of cs6
from the raw log is assigned to this field. |
cs6Label
|
security_result.detection_fields[].key
|
The value of cs6Label
from the raw log is assigned to this field. |
data
|
security_result.detection_fields[].value
|
The value of data
from the suser
JSON object in the raw log is assigned to this field if the suser
field is a JSON. |
deviceInboundInterface
|
additional.fields[].key
|
The string "deviceInboundInterface" is assigned to this field. |
deviceInboundInterface
|
additional.fields[].value.string_value
|
The value of deviceInboundInterface
from the raw log is assigned to this field. |
deviceOutboundInterface
|
additional.fields[].key
|
The string "deviceOutboundInterface" is assigned to this field. |
deviceOutboundInterface
|
additional.fields[].value.string_value
|
The value of deviceOutboundInterface
from the raw log is assigned to this field. |
dpt
|
target.port
|
The value of dpt
from the raw log is assigned to this field and converted to an integer. |
dst
|
target.asset.ip
|
The value of dst
from the raw log is assigned to this field. |
dst
|
target.ip
|
The value of dst
from the raw log is assigned to this field. |
dvcpid
|
security_result.about.process.pid
|
The value of dvcpid
from the raw log is assigned to this field. |
dvchost
|
target.asset.hostname
|
The value of dvchost
from the raw log is assigned to this field. |
dvchost
|
target.hostname
|
The value of dvchost
from the raw log is assigned to this field. |
hostname
|
principal.asset.hostname
|
The value of hostname
from the raw log is assigned to this field. |
hostname
|
principal.hostname
|
The value of hostname
from the raw log is assigned to this field. Determined by parser logic based on the presence of principal
and target
information. If both are present, the value is "NETWORK_CONNECTION". If only principal
is present, the value is "STATUS_UPDATE". If only target
is present, the value is "USER_UNCATEGORIZED". Otherwise, the value is "GENERIC_EVENT". |
product_event_type
|
metadata.product_event_type
|
The value of product_event_type
from the raw log is assigned to this field. |
product_name
|
metadata.product_name
|
The value of product_name
from the raw log is assigned to this field. |
proto
|
network.ip_protocol
|
The value of proto
from the raw log is converted to an integer, then mapped to the corresponding IP protocol name (e.g., 6 becomes TCP, 17 becomes UDP) using a lookup included from "parse_ip_protocol.include". |
severity
|
security_result.severity_details
|
The value of severity
from the raw log is assigned to this field. |
spt
|
principal.port
|
The value of spt
from the raw log is assigned to this field and converted to an integer. |
src
|
principal.asset.ip
|
The value of src
from the raw log is assigned to this field. |
src
|
principal.ip
|
The value of src
from the raw log is assigned to this field. |
suser
|
security_result.detection_fields[].value
|
The value of suser
from the raw log is assigned to this field if it's not a JSON object. If it's a JSON, the data
field from the suser
object is used. |
suser
|
security_result.detection_fields[].key
|
The string "suser" is assigned to this field. |
ts
|
metadata.event_timestamp
|
The value of ts
from the raw log is parsed as a timestamp and assigned to this field. Several timestamp formats are attempted until a successful parse is achieved. |
vendor_name
|
metadata.vendor_name
|
The value of vendor_name
from the raw log is assigned to this field. |
version
|
metadata.product_version
|
The value of version
from the raw log is assigned to this field. |
Need more help? Get answers from Community members and Google SecOps professionals.

