Collect Snort logs

Supported in:

This document explains how to collect Snort logs to Google Security Operations by using Bindplane. The parser attempts to handle two different Snort log formats (SYSLOG + JSON) using grok patterns to extract relevant fields. Depending on the identified format, it further processes the data, mapping extracted fields to the unified data model (UDM) schema, normalizing values, and enriching the output with additional context.

Before you begin

  • Ensure that you have a Google Security Operations instance.
  • Ensure that you are using Windows 2016 or later, or a Linux host with systemd .
  • If running behind a proxy, ensure firewall ports are open.
  • Ensure that you have privileged access to Snort.

Get Google SecOps ingestion authentication file

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Collection Agents.
  3. Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.

Get Google SecOps customer ID

  1. Sign in to the Google SecOps console.
  2. Go to SIEM Settings > Profile.
  3. Copy and save the Customer IDfrom the Organization Detailssection.

Install the Bindplane agent

Windows installation

  1. Open the Command Promptor PowerShellas an administrator.
  2. Run the following command:

      msiexec 
      
     / 
     i 
      
     "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" 
      
     / 
     quiet 
     
    

Linux installation

  1. Open a terminal with root or sudo privileges.
  2. Run the following command:

     sudo  
    sh  
    -c  
     " 
     $( 
    curl  
    -fsSlL  
    https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh ) 
     " 
      
    install_unix.sh 
    

Additional installation resources

Configure the Bindplane agent to ingest Syslog and send to Google SecOps

  1. Access the configuration file:

    1. Locate the config.yaml file. Typically, it's in the /etc/bindplane-agent/ directory on Linux or in the installation directory on Windows.
    2. Open the file using a text editor (for example, nano , vi , or Notepad).
  2. Edit the config.yaml file as follows:

      receivers 
     : 
      
     udplog 
     : 
      
     # Replace the port and IP address as required 
      
     listen_address 
     : 
      
     "0.0.0.0:514" 
     exporters 
     : 
      
     chronicle/chronicle_w_labels 
     : 
      
     compression 
     : 
      
     gzip 
      
     # Adjust the path to the credentials file you downloaded in Step 1 
      
     creds 
     : 
      
     '/path/to/ingestion-authentication-file.json' 
      
     # Replace with your actual customer ID from Step 2 
      
     customer_id 
     : 
      
    < customer_id 
    >  
     endpoint 
     : 
      
     malachiteingestion-pa.googleapis.com 
      
     # Add optional ingestion labels for better organization 
      
     ingestion_labels 
     : 
      
     log_type 
     : 
      
     SNORT_IDS 
      
     raw_log_field 
     : 
      
     body 
     service 
     : 
      
     pipelines 
     : 
      
     logs/source0__chronicle_w_labels-0 
     : 
      
     receivers 
     : 
      
     - 
      
     udplog 
      
     exporters 
     : 
      
     - 
      
     chronicle/chronicle_w_labels 
     
    
  3. Replace the port and IP address as required in your infrastructure.

  4. Replace <customer_id> with the actual customer ID.

  5. Update /path/to/ingestion-authentication-file.json to the path where the authentication file was saved in the Get Google SecOps ingestion authentication file section.

Restart the Bindplane agent to apply the changes

  • To restart the Bindplane agent in Linux, run the following command:

     sudo  
    systemctl  
    restart  
    bindplane-agent 
    
  • To restart the Bindplane agent in Windows, you can either use the Servicesconsole or enter the following command:

     net stop BindPlaneAgent && net start BindPlaneAgent 
    

Configure syslog export on Snort v2.x

  1. Sign in to the Snort device using terminal.
  2. Edit the following file: /etc/snort/snort.conf
  3. Go to 6) Configure output plugins .
  4. Add following entry:

     # syslog
    output alert_syslog: host= BINDPLANE_IP_ADDRESS : PORT_NUMBER , LOG_AUTH LOG_ALERT 
     
     
     
     
         
     
     
     
    
  5. Replace the following:

    • BINDPLANE_IP_ADDRESS : Bindplane Agent IP address.
    • PORT_NUMBER : Bindplane Agent port number.
  6. Save the file.

  7. Start the snortservice.

  8. Stop the rsyslogservice.

  9. Edit the following file: /etc/rsyslogd.conf

     # remote host is: name/ip:port
    *.* @@ BINDPLANE_IP_ADDRESS : PORT_NUMBER  
     
     
     
     
         
     
     
     
    
  10. Replace the following:

    • BINDPLANE_IP_ADDRESS : Bindplane Agent IP address.
    • PORT_NUMBER : Bindplane Agent port number.
  11. Start the rsyslogservice.

Configure syslog export on Snort v3.1.53

  1. Sign in to the Snort device using terminal.
  2. Stop the rsyslogand snortservices.
  3. Go to the following Snort installation directory: /usr/local/etc/snort/
  4. Edit the following Snort configuration file: snort.lua

  5. In the Configure outputsoptions, append the following code (you can use any facility and level):

     alert_syslog =
      {
        facility = 'local3',
        level = 'info',
      } 
    
  6. Save the Snort configuration file.

  7. Go to the rsyslogservice default configuration files directory: /etc/rsyslog.d

  8. Create a new file: 3-snort.conf :

     # cd /etc/rsyslog.d
    # vi 3-snort.conf 
    
  9. To send logs over TCP or UDP, add the following configuration: local3.* @@ BINDPLANE_IP_ADDRESS : PORT_NUMBER

  10. Replace the following:

    • BINDPLANE_IP_ADDRESS : Bindplane agent IP address.
    • PORT_NUMBER : Bindplane agent port number.
  11. Save the file.

  12. Start rsyslogand then the snortservice.

UDM Mapping Table

Log Field UDM Mapping Logic
agent.hostname
observer.hostname Value taken from agent.hostname field in the raw log.
agent.id
observer.asset_id Value taken from agent.id field in the raw log and concatenated with agent.type as follows: agent.type:agent.id .
agent.type
observer.application Value taken from agent.type field in the raw log.
agent.version
observer.platform_version Value taken from agent.version field in the raw log.
alert.category
security_result.category_details Value taken from alert.category field in the raw log.
alert.rev
security_result.rule_version Value taken from alert.rev field in the raw log.
alert.rule
security_result.summary Value taken from alert.rule field in the raw log, with double quotes removed.
alert.severity
security_result.severity If alert.severity is greater than or equal to 4, set to LOW . If alert.severity is 2 or 3, set to MEDIUM . If alert.severity is 1, set to HIGH . Otherwise, set to UNKNOWN_SEVERITY .
alert.signature
security_result.rule_name Value taken from alert.signature field in the raw log.
alert.signature_id
security_result.rule_id Value taken from alert.signature_id field in the raw log.
app_proto
network.application_protocol If app_proto is dns , smb , or http , convert to uppercase and use that value. Otherwise, set to UNKNOWN_APPLICATION_PROTOCOL .
category
security_result.category If category is trojan-activity , set to NETWORK_MALICIOUS . If category is policy-violation , set to POLICY_VIOLATION . Otherwise, set to UNKNOWN_CATEGORY .
classtype
security_result.rule_type Value taken from classtype field in the raw log, if it's not empty or unknown .
community_id
network.community_id Value taken from community_id field in the raw log.
date_log
Used to set the event timestamp if time field is empty.
desc
metadata.description Value taken from desc field in the raw log.
dest_ip
target.ip Value taken from dest_ip field in the raw log.
dest_port
target.port Value taken from dest_port field in the raw log and converted to integer.
dstport
target.port Value taken from dstport field in the raw log and converted to integer.
file.filename
security_result.about.file.full_path Value taken from file.filename field in the raw log, if it's not empty or / .
file.size
security_result.about.file.size Value taken from file.size field in the raw log and converted to unsigned integer.
host.name
principal.hostname Value taken from host.name field in the raw log.
hostname
principal.hostname Value taken from hostname field in the raw log.
inter_host
intermediary.hostname Value taken from inter_host field in the raw log.
log.file.path
principal.process.file.full_path Value taken from log.file.path field in the raw log.
metadata.version
metadata.product_version Value taken from metadata.version field in the raw log.
proto
network.ip_protocol Value taken from proto field in the raw log. If it's a number, it's converted to the corresponding IP protocol name using a lookup table.
rule_name
security_result.rule_name Value taken from rule_name field in the raw log.
signature_id
security_result.rule_id Value taken from signature_id field in the raw log.
signature_rev
security_result.rule_version Value taken from signature_rev field in the raw log.
src_ip
principal.ip Value taken from src_ip field in the raw log.
src_port
principal.port Value taken from src_port field in the raw log and converted to integer.
srcport
principal.port Value taken from srcport field in the raw log and converted to integer.
time
Used to set the event timestamp.
metadata.event_type Always set to SCAN_NETWORK .
metadata.log_type Hardcoded to SNORT_IDS .
metadata.product_name Hardcoded to SNORT_IDS .
metadata.vendor_name Hardcoded to SNORT .
security_result.action Set to ALLOW if alert.action is allowed , otherwise set to UNKNOWN_ACTION .

Need more help? Get answers from Community members and Google SecOps professionals.

Design a Mobile Site
View Site in Mobile | Classic
Share by: