Collect Swift Alliance Messaging Hub logs
This document explains how to ingest Swift Alliance Messaging Hub (AMH) logs to Google Security Operations using Bindplane.
Swift Alliance Messaging Hub (AMH) is a financial messaging platform used for SWIFT network message routing, monitoring, and audit logging. The Bindplane agent collects AMH log files directly from the local file system.
Before you begin
Make sure you have the following prerequisites:
- A Google SecOps instance
- Windows Server 2016 or later, or Linux host with
systemd - Network connectivity between the Bindplane agent and the Swift AMH server
- If running behind a proxy, ensure firewall ports are open per the Bindplane agent requirements
- Privileged access to the Swift AMH server with administrator permissions
Get Google SecOps ingestion authentication file
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Collection Agents.
Download the Ingestion Authentication File. Save the file securely on the system where Bindplane will be installed.
Get Google SecOps customer ID
- Sign in to the Google SecOps console.
- Go to SIEM Settings > Profile.
Copy and save the Customer ID from the Organization Details section.
Install the Bindplane agent
Install the Bindplane agent on your Windows or Linux operating system according to the following instructions.
Windows installation
- Open Command Prompt or PowerShell as an administrator.
Run the following command:
msiexec /i "https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi" /quietWait for the installation to complete.
Verify the installation by running:
sc query observiq-otel-collector
The service should show as RUNNING.
Linux installation
- Open a terminal with root or sudo privileges.
Run the following command:
sudo sh -c "$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)" install_unix.shWait for the installation to complete.
Verify the installation by running:
sudo systemctl status observiq-otel-collector
The service should show as active (running).
Additional installation resources
For additional installation options and troubleshooting, see Bindplane agent installation guide.
Configure Bindplane agent to ingest logs and send to Google SecOps
Locate the configuration file
Linux:
sudo nano /etc/bindplane-agent/config.yamlWindows:
notepad "C:\Program Files\observIQ OpenTelemetry Collector\config.yaml"
Edit the configuration file
Replace the entire contents of
config.yamlwith the following configuration:receivers: filelog: include: - /opt/swift/amh/log/*.log start_at: beginning exporters: chronicle/swift_amh: compression: gzip creds_file_path: '/etc/bindplane-agent/ingestion-auth.json' customer_id: '<customer_id>' endpoint: malachiteingestion-pa.googleapis.com log_type: SWIFT_AMH raw_log_field: body ingestion_labels: env: production service: pipelines: logs/swift_amh_to_chronicle: receivers: - filelog exporters: - chronicle/swift_amh
Configuration parameters
Replace the following placeholders:
Receiver configuration:
filelog: The receiver type for collecting log files from diskinclude: List of file paths to monitor. Default Swift AMH log locations:- Linux:
/opt/swift/amh/log/*.logor/var/log/swift/amh/*.log - Windows:
C:\Swift\AMH\log\*.log
- Linux:
start_at: Set tobeginningto read existing logs orendto only read new entries
Exporter configuration:
swift_amh: Descriptive name for the exportercreds_file_path: Full path to ingestion authentication file:- Linux:
/etc/bindplane-agent/ingestion-auth.json - Windows:
C:\Program Files\observIQ OpenTelemetry Collector\ingestion-auth.json
- Linux:
<customer_id>: Customer ID from the previous stependpoint: Regional endpoint URL:- US:
malachiteingestion-pa.googleapis.com - Europe:
europe-malachiteingestion-pa.googleapis.com - Asia:
asia-southeast1-malachiteingestion-pa.googleapis.com - See Regional Endpoints for complete list
- US:
SWIFT_AMH: Log type exactly as it appears in Chronicleingestion_labels: Optional labels in YAML format (for example,env: production)
Pipeline configuration:
swift_amh_to_chronicle: Descriptive name for the pipeline
Save the configuration file
- After editing, save the file:
- Linux: Press
Ctrl+O, thenEnter, thenCtrl+X - Windows: Click File > Save
- Linux: Press
Restart the Bindplane agent to apply the changes
To restart the Bindplane agent in Linux:
Run the following command:
sudo systemctl restart observiq-otel-collectorVerify the service is running:
sudo systemctl status observiq-otel-collectorCheck logs for errors:
sudo journalctl -u observiq-otel-collector -f
To restart the Bindplane agent in Windows:
Choose one of the following options:
- Command Prompt or PowerShell as administrator:
net stop observiq-otel-collector && net start observiq-otel-collector- Services console:
- Press
Win+R, typeservices.msc, and press Enter. - Locate observIQ OpenTelemetry Collector.
- Right-click and select Restart.
- Press
Verify the service is running:
sc query observiq-otel-collectorCheck logs for errors:
type "C:\Program Files\observIQ OpenTelemetry Collector\log\collector.log"
Configure Swift Alliance Messaging Hub logging
- Sign in to the Swift AMH server with administrator privileges.
Navigate to the AMH log directory. Default paths include:
- Linux:
/opt/swift/amh/log/or/var/log/swift/amh/ - Windows:
C:\Swift\AMH\log\
- Linux:
Key log files include:
- Audit logs (
audit*.log): User login/logout events, message routing decisions, and configuration changes. - Message logs (
msg*.log): SWIFT message processing, routing, and delivery events. - System logs (
system*.log): Application start/stop, errors, and performance events.
- Audit logs (
(Optional) To export additional log data from the AMH Web Console:
- Sign in to the Swift AMH web console.
- Go to Monitoring > Event Journal.
- Configure the date range and event filters.
- Click Export to download the event data.
- Save the exported file to the log directory monitored by the Bindplane agent.
Ensure the Bindplane agent
includepaths inconfig.yamlmatch the actual log file locations on your Swift AMH server.
UDM mapping table
| Log Field | UDM Mapping | Logic |
|---|---|---|
| about | Additional context or metadata about the event | |
| spanId, traceId, aal, mr | about.labels | Key-value pairs providing additional labels for the event |
| extensions.auth.type | Type of authentication used | |
| Intermediary | intermediary | Information about intermediary entities involved in the event |
| target.data.message.Header.DateCreated | metadata.event_timestamp | Timestamp when the event occurred |
| metadata.event_type | Type of event (e.g., USER_LOGIN, NETWORK_CONNECTION) | |
| traceId | metadata.product_deployment_id | Identifier for the product deployment |
| snmp_1_3_6_1_4_1_18494_2_1_5, event_number, product_event_type | metadata.product_event_type | Product-specific event type |
| target.data.message.Header.MessageType.Code, snmp_1_3_6_1_4_1_18494_2_1_10, sag, product_object_id | metadata.product_log_id | Product-specific log identifier |
| metadata.product_version | Version of the product | |
| sessionid, session | network.session_id | Identifier for the network session |
| data.creationDate | principal.asset.creation_time | Time when the asset was created |
| target.data.message.Header.DateDelivered | principal.asset.last_discover_time | Last time the asset was discovered |
| target.data.message.Status.CurrentStatus.StatusDate | principal.asset.system_last_update_time | Last system update time for the asset |
| ldap_group | principal.group.group_display_name | Display name of the group |
| hostname | principal.hostname | Hostname of the principal |
| client | principal.ip | Source IP address of the connection |
| target.data.message.Header.TransactionReference | principal.process.parent_pid | Parent process ID |
| target.data.message.Header.MessageReference | principal.process.pid | Process ID |
| amount, currency, offset, bussiness_element, pl | principal.resource.attribute.labels | Labels for resource attributes |
| message_partner | principal.resource.name | Name of the resource |
| pal | principal.user.attribute.labels | Labels for user attributes |
| uumid | principal.user.product_object_id | Product-specific object ID for the user |
| first_name last_name, user_HSM1 | principal.user.user_display_name | Display name of the user |
| userid, record.User, user, record.Description | principal.user.userid | User identifier |
| ac, sr | security_result | Result of security analysis or action |
| operator | src.user.userid | Source user identifier |
| act | sr.action | Action taken in the security result |
| snmp_1_3_6_1_4_1_18494_2_1_9, description | sr.description | Description of the security result |
| event_class | sr.rule_name | Name of the rule that triggered the security result |
| sr.severity | Severity level of the security result | |
| snmp_1_3_6_1_4_1_18494_2_1_6, event_severity, severity | sr.severity_details | Detailed severity information |
| snmp_1_3_6_1_4_1_18494_2_1_8, summary | sr.summary | Summary of the security result |
| target.hostname | Destination hostname | |
| tip | target.ip | Destination IP address |
| target.data.message.Header.TransferReference | target.process.pid | Target process ID |
| target_display_name, user_HSM1 | target.user.user_display_name | Display name of the target user |
| record.Description, user_cn, user_HSM1, userid | target.user.userid | Target user identifier |
| metadata.product_name | Name of the product | |
| metadata.vendor_name | Vendor/company name |
Need more help? Get answers from Community members and Google SecOps professionals.