Google Cloud VPC Flow
About The Device
VPC Flow Logs records a sample of network flows sent from and received by VM instances. These logs can be used for network monitoring, forensics, real-time security analysis, and expense optimization.
You can view flow logs in Cloud Logging, and you can export logs to any destination that Cloud Logging export supports.Â
Device Information
 Entity | Particulars |
---|---|
Vendor Name | |
Product Name | Cloud VPC Flow |
Type of Device | Cloud |
Collection Method
Log Type | Â Ingestion label | Preferred Logging Protocol - Format | Log Collection Method | Data Source |
---|---|---|---|---|
VPC Flow Logs |  GCP_VPC_FLOW (Raw log telemetry) | Prop Vendor API - JSON |  C2C - Storage | https://cloud.google.com/chronicle/docs/reference/feed-management-api#gc-storage |
Device Configuration
Please follow the steps below to enable raw log telemetry.
Pre-Requisite:
Please create Cloud Storage Bucket.
Chronicle Service Account which will be provided by Adaptive MXDR Team.
Configure VPC flow logs:
Login to Google Cloud account using credentials.
On Welcome page, click VPC Network
3.In VPC networks, click Default.
In Subnets, select all logs and click Flow Logs > Configure.
5.Select Aggregation Interval and enter Sample Rate. (For example, enter 50%)
6.Click Save.
After saving, VPC logs start flowing into Chronicle
Next, search Logging in the search bar at the top and click Enter. By default, it navigates you to Log Explorer.
In Log Explorer, you can see all logs that come from multiple sources. Filter the logs by choosing VPC_flows in Log Name and click Apply.
All VPC logs are sorted out in the page
9.Click More Actions and select Create Sink.
In Logs Router screen, in Create logs Routing Sink window, fill the following details:
In Sink Details, enter Name & Description and click Next. (For example, test_gcp_vcp_flows & GCP Flows)
In Sink Destination, in Select sink service, select Cloud Storage Bucket and in Cloud Storage Bucket, select bucket which you have created as mentioned in pre-requisite.
In Choose Logs to include in Sink, a default log is populated once you select an option in Cloud Storage Bucket and click Next.
(Optional) In Choose Logs to filter out of Sink, choose the logs that you would like not to sink
Click Create Sink. All logs will be sinked and stored in Cloud Storage Bucket
Viewing VPC logs in Cloud Storage Bucket:
To view the VPC logs that are synchronized in cloud storage bucket, first you must grant the Chronicle access. You must add the email address of Chronicle Service Account to the permissions of the relevant Google Cloud Storage object(s). You must also perform the following actions from the Cloud Storage section in the Google Cloud Console.
To grant read permission to a specific file, you can "Edit access" on that file and grant "Reader" access to Chronicle Service Account. This can only be done if you have not enabled uniform bucket-level access.
If you configure the feed to delete source files (see below for how to do this), you must add Chronicle Service Account as a principle on your bucket and grant it the IAM role of Storage Object Admin.
To grant read permission to multiple files you must grant access at the bucket level. Specifically, you must add Chronicle Service Account as a principle to your storage bucket and grant it the IAM role of Storage Object Viewer.
To enable permission to multiple files in a single bucket at a time, following steps help you achieve it.
Click on the bucket that you would like enable permissions.
In Permissions, click ADD
Mention CHRONICLE SERVICE ACCOUNT provided by Adaptive MXDR team in New Principals.
In Role, select Storage Object Viewer.
Click Save. A
gsutil URL
is generated for a storage bucket that you have enabled permissions
Â
In order to ingest VPC logs into Chronicle, you must copy
gsutil URL
from the configuration tab of a storage bucket and paste it in the Input parameters of Chronicle Feeds.
Â
Integration Parameters
Property | Default Value | Description |
---|---|---|
 STORAGE BUKCET URI |  N/A |  The URI which corresponds to the Google Cloud Storage bucket. The format is the same format used by |
URI IS A | N/A | The type of object indicated by
|
SOURCE DELETION OPTION | N/A | Whether to delete source files after they have been transferred to Google Security Operations. This reduces storage costs. Valid values are:
|
About Accenture:
Accenture is a leading global professional services company that helps the world’s leading businesses, governments and other organizations build their digital core, optimize their operations, accelerate revenue growth and enhance citizen services—creating tangible value at speed and scale. We are a talent and innovation led company with 738,000 people serving clients in more than 120 countries. Technology is at the core of change today, and we are one of the world’s leaders in helping drive that change, with strong ecosystem relationships. We combine our strength in technology with unmatched industry experience, functional expertise and global delivery capability. We are uniquely able to deliver tangible outcomes because of our broad range of services, solutions and assets across Strategy & Consulting, Technology, Operations, Industry X and Accenture Song. These capabilities, together with our culture of shared success and commitment to creating 360° value, enable us to help our clients succeed and build trusted, lasting relationships. We measure our success by the 360° value we create for our clients, each other, our shareholders, partners and communities. Visit us at www.accenture.com.
About Accenture Security
Accenture Security is a leading provider of end-to-end cybersecurity services, including advanced cyber defense, applied cybersecurity solutions and managed security operations. We bring security innovation, coupled with global scale and a worldwide delivery capability through our network of Advanced Technology and Intelligent Operations centers. Helped by our team of highly skilled professionals, we enable clients to innovate safely, build cyber resilience and grow with confidence. Follow us @AccentureSecure on Twitter or visit us at www.accenture.com/security.
Legal notice: Accenture, the Accenture logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of Accenture and its subsidiaries in the United States and in foreign countries. All trademarks are properties of their respective owners. This document is intended for general informational purposes only and does not take into account the reader’s specific circumstances, and may not reflect the most current developments. Accenture disclaims, to the fullest extent permitted by applicable law, any and all liability for the accuracy and completeness of the information in this presentation and for any acts or omissions made based on such information. Accenture does not provide legal, regulatory, audit, or tax advice. Readers are responsible for obtaining such advice from their own legal counsel or other licensed professionals.