Prepare your environment for log ingestion

This guide explains how to:

  • Onboard to Google SecOps: Provision and configure your Google SecOps instance.
  • Set up the Bindplane server: Install and configure the centralized ingestion point required for all application logs and self-managed infrastructure logs.
  • Prepare for infrastructure logs ingestion: Coordinate for SAP RISE (LogServ) and confirm your infrastructure is ready for self-managed log collection.
  • Prepare for application logs ingestion: Set up the required Google Cloud resources, SAP service user, authorizations, and secure communication.

After completing these preparation steps, you configure the ingestion-specific resources as part of the log ingestion setup for your specific environment.

Onboard to Google SecOps

Before ingesting SAP logs into Google SecOps, provision and configure a Google SecOps instance. A Google Cloud project serves as the control layer for this instance, where your security logs, audit logs, and sensitive instance-level data are stored. The onboarding process involves preparing your Google Cloud environment, setting up an identity provider, and deploying the instance through an activation link.

Google SecOps resources

For detailed configuration guides, see the following Google SecOps documentation:

Resource Description
Onboarding Overview Primary guide for deploying Standard, Enterprise, and Enterprise Plus packages.
Configure Google Cloud project Detailed steps for enabling the Google SecOps API and setting up the project control layer.
Link a Google SecOps instance to Google Cloud Instructions for using the one-time activation link and connecting to Google SecOps services.
Configure third-party identity Setup guide for Workforce Identity Federation with providers like Okta or Azure AD.
Configure Google Cloud identity Configuration steps for organizations using Cloud Identity or Google Workspace.
Access a Google SecOps instance Post-deployment requirements to ensure administrators and users can sign in.

For permissions required to deploy a Google SecOps instance, see Required roles and permissions .

Set up the Bindplane server

The Bindplane server acts as the centralized ingestion point for your SAP logs. Before configuring log ingestion, you must have a Bindplane server instance installed and accessible.

Bindplane resources

To install and configure the Bindplane server, see the following Bindplane documentation:

Resource Description
Install PostgreSQL Instructions for installing the required PostgreSQL database.
Install Bindplane server Instructions for installing the Bindplane server.
Access Bindplane UI Instructions for accessing the centralized management interface.

After you install the Bindplane server, ensure that you can sign in to the BindPlane UI. This access is required for subsequent configuration steps.

Prepare for infrastructure logs ingestion

The method for extracting infrastructure logs depends on whether your environment is managed by SAP (SAP RISE) or self-managed.

For SAP RISE (LogServ)

In an SAP RISE environment, SAP Enterprise Cloud Services (ECS) manages infrastructure log extraction through the LogServ service.

To ensure that the LogServ service is provisioned and configured for your landscape, do the following:

  1. Enable LogServ: Contact your SAP account team to enable LogServ for your landscape.
  2. Provide the Google SecOps identity: Provide the service account used by the Google SecOps feed to your SAP ECS representative. SAP ECS provisions the destination storage and notification resources for your landscape and grants the necessary roles to this identity, including Storage Object Viewer for Cloud Storage or S3 Bucket Policy updates for AWS.

  3. Obtain resource details: Obtain the bucket and notification details from your SAP ECS representative. Depending on your hosting provider, these might include:

    • Google Cloud: Storage bucket URI and Pub/Sub subscription name.
    • AWS: S3 bucket URI and SQS queue ARN.
    • Azure: Storage account name, container name, and storage queue URI.

For self-managed systems

For self-managed environments, infrastructure logs are collected by the Bindplane agents installed on your SAP hosts.

To prepare for this collection, ensure you have completed the Set up the Bindplane server step. You install and configure the individual agents during the log ingestion setup for self-managed SAP .

Prepare for application logs ingestion

Connect to your SAP application servers through the Application Telemetry Collector to extract application logs. These steps apply to both SAP RISE and self-managed environments.

Configure Google Cloud resources

Set up the required Google Cloud resources and identity for the Application Telemetry Collector.

Enable APIs

Enable the following APIs in your project:

  • Secret Manager API( secretmanager.googleapis.com ): Required to securely store and retrieve SAP service user credentials and SNC artifacts.
  • Cloud Storage API( storage.googleapis.com ): Required to manage the storage buckets used for SAP Java Connector (JCo) libraries and configuration state.
  • Cloud Monitoring API( monitoring.googleapis.com ): Required to send health and performance metrics for the collector.

For information about how to enable Google Cloud APIs, see Enabling APIs .

Set up Cloud Storage buckets and IAM roles

Set up the Cloud Storage buckets and IAM roles required for the collector to store its configuration and libraries.

  • Service Account and IAM: In your Google Cloud project, create a Service Account for the collector and grant the following roles:

    • Storage Object Admin ( roles/storage.objectAdmin ): To read configuration and libraries, and maintain application state.
    • Secret Manager Secret Accessor ( roles/secretmanager.secretAccessor ): Required to retrieve SAP credentials, PSE files, and certificates from Secret Manager.
    • Monitoring Metric Writer ( roles/monitoring.metricWriter ): If heartbeat_enabled is set to true in your configuration.

    For more information about creating service accounts, see Create service accounts .

    For more information about granting roles, see Grant or revoke a single role .

  • Service Account Key(External hosts only): If your collector host is outside Google Cloud, then create and download a Service Account key (JSON). This key is used for authentication between the collector and Google Cloud APIs.

    For more information about managing service account keys, see Create and delete service account keys .

  • Cloud Storage: Create a bucket in your project to store the collector's configuration and libraries.

    • Create a folder named jco/ .
    • Create a folder named config/ .

    For instructions on creating and managing buckets, see Create buckets .

Prepare the SAP application layer

Configure your SAP system to allow the Application Telemetry Collector to connect and extract the required logs.

Create an SAP service user

Google SecOps for SAP uses a dedicated SAP service user to extract application logs.

  1. In your SAP system, run transaction SU01 .
  2. In the Userfield, enter a name for the service user and click Create.
  3. On the Addresstab, provide any required information, such as the last name.
  4. On the Logon Datatab:
    • Set the User Typeto Systemor Communication. These types ensure the user can only be used for background tasks or API calls and cannot be used for interactive logons.
    • Assign and confirm a secure Password.
  5. Make a note of the user IDand password. These credentials are required when you configure the Application Telemetry Collector.
  6. (Highly recommended) If you use SNC, use X.509 certificates for mutual authentication on the SNCtab to avoid using static passwords.

For more information about maintaining user accounts, see SAP Community: How to create a new user in SAP .

Configure SAP authorizations

To extract logs from the SAP application layer, the service user requires specific SAP authorizations. We recommend creating a custom role, for example, Z_GOOGLE_SECOPS_COLLECTOR , and assigning the role to the service user.

Set up remote function call (RFC) authorizations

The collector acts as an RFC client. Authorize the service user to execute the following function modules:

Authorization object Field Value
S_RFC
RFC_TYPE FUNC (Function module)
S_RFC
RFC_NAME RSAU_API_GET_LOG_DATA , RFC_READ_TABLE
S_RFC
ACTVT 16 (Execute)
Set up security audit log authorizations

To extract Security Audit Logs, the service user requires access to the following objects:

Authorization object Field Value
S_BCE_LOG
ACTVT 03 (Display)
S_SEC_ALX
ACTVT 03 (Display)
Set up table access authorizations

To read SAP Change Documents, the service user requires read access to the following tables:

Authorization object Field Value
S_TABU_DIS
DICBERCLS &NC& (or the specific group for CDHDR / CDPOS )
S_TABU_NAM
TABLE CDHDR , CDPOS
S_TABU_DIS
ACTVT 03 (Display)

Enable security audit logging

The Application Telemetry Collector extracts logs from the SAP Security Audit Log. To ensure logs are available for extraction:

  1. Use transaction SM19 , or RSAU_CONFIG in newer versions, to confirm that Security Audit Logging is status Active.
  2. Ensure that the logging filters are configured to capture the events you want to monitor in Google SecOps.

Configure authentication and encryption

Specify how the Application Telemetry Collector authenticates with your SAP system. You can use either basic authentication (username and password) or Secure Network Communication (SNC) with X.509 certificates.

Basic authentication

Use basic authentication if you want to connect to SAP using a username and password.

  1. SAP Credentials: Ensure you have the user ID and password for the SAP service user created in the Create an SAP service user step.
  2. Store credentials in Secret Manager: Create two secrets in Secret Manager to securely store the username and password.

For information about creating secrets, see Secret Manager .

When you create the secrets, make a note of the fully qualified name for the secret version: projects/ PROJECT_ID /secrets/ SECRET_NAME /versions/ VERSION .

Secure Network Communication (SNC)

We highly recommend using SNC to protect your SAP credentials and encrypt log data in transit. SNC supports X.509 certificates for mutual authentication, which eliminates the need to maintain static passwords.

Configure SNC for X.509 certificate-based authentication

If you use X.509 for authentication, configure SNC for the service user. For detailed instructions, see the SAP documentation or Section 4.10: X.509 and Kerberos Authentication in the SAP Single Sign-On guide.

To generate the required SNC artifacts, run the following sapgenpse commands on your collector host:

  1. Create the PSE file:

     sapgenpse  
    get_pse  
    -p  
     PSE_NAME 
      
     SNC_NAME 
     
    
  2. Create the credentials file ( cred_v2 ):

     sapgenpse  
    seclogin  
    -p  
     PSE_NAME 
      
    -O  
     OS_USER 
     
    
  3. Export the public certificate:

     sapgenpse  
    export_own_cert  
    -p  
     PSE_NAME 
      
    -o  
    collector_cert.crt 
    

Replace the following:

  • PSE_NAME : The name of your PSE file, for example sapcrypto.pse .
  • SNC_NAME : The SNC name of the collector as configured in SAP.
  • OS_USER : The operating system user that runs the Application Telemetry Collector container.
Store SNC artifacts in Secret Manager

After you generate the required artifacts, create a secret in Secret Manager for each of the following files:

  • PSE file: The generated .pse file.
  • Credentials file: The generated cred_v2 file.
  • Public certificate: The generated collector_cert.crt file.

For information about creating secrets, see Secret Manager .

When you create the secrets, make a note of the fully qualified name for the secret version: projects/ PROJECT_ID /secrets/ SECRET_NAME /versions/ VERSION .

Get support

For issues related to Google SecOps for SAP, contact Google SecOps support . Our team provides assistance or guides you to the right resource to help ensure a timely resolution.

For issues involving SAP systems or the LogServ service, contact SAP support. For issues related to other third-party products, such as Bindplane, contact the appropriate third-party vendor for assistance.

Get technical answers and peer support in the Google SecOps Community .

What's next

After your SAP system is prepared, choose the ingestion path for your environment:

Design a Mobile Site
View Site in Mobile | Classic
Share by: