Collect Google SecOps SOAR logs

Supported in:

You can manage and monitor Google Security Operations SOAR logs in the Google Cloud Logs Explorer. You can also use Google Cloud tools to set up special metrics and alerts that are triggered by specific events in your SOAR operation logs.

The logs capture essential data from SOAR's Extract, Transform, Load (ETL), playbook, and Python functions. The logs capture data types including the running of Python scripts, alert ingestion, and playbook performance.

Enable SOAR log collection

Google SecOps provides operational logs for SOAR activities, including playbook executions, connector runs, and Python script outputs.

  • Google SecOps (SIEM + SOAR Unified): By default, the system enables collection of SOAR logs. The platform automatically configures log sinks to route these logs to Cloud Logging in your Google Cloud project. You don't need to perform any manual configuration.

  • SOAR Standalone: You must manually configure a service account and provide the credentials to Google SecOps Support to enable log export. See the following section for instructions.

The system automatically routes SOAR logs to the _Default cloud logging bucket. Because this incurs costs, Google recommends setting up exclusion filters to drop low-value logs or to adjust retention periods. For more information on collecting logs and setting up filters, see Logging overview.

Set up SOAR logs for SOAR Standalone

To set up SOAR log collection for SOAR Standalone, follow these steps:

  1. Create a Service Account in the Google Cloud project where you plan to view the logs. For details, see Create service accounts.

  2. In the Google Cloud console, go to IAM & Admin > IAM.

    Go to IAM

  3. Locate the Service Account you created and click edit Edit principal.

  4. In the Assign Roles section, add the Logs Writer role. For more information, see the predefined Logs Writer role.

  5. Click Save.

  6. Go to IAM & Admin > Service Accounts.

  7. Select the service account you created.

  8. Click More and select Manage Permissions.

  9. In the Permissions section, click Grant Access.

    Grant access in Permissions section.

  10. In the New principals field, add the following principal: gke-init-backgroundservices@{SOAR-GCP-Project-Id}.iam.gserviceaccount.com

    Replace {SOAR-GCP-Project-Id} with your SOAR Google Cloud Project ID. If you don't know the SOAR-GCP-Project-Id, submit a ticket through Google Support.

  11. In Assign Roles, select Service Account Token Creator. For more information, see Service Account Token Creator.

  12. Click Save.

  13. Provide the name of the configured Service Account to the Google SecOps support team.

Access Google SecOps SOAR logs

Google SecOps writes SOAR logs in a separate namespace called chronicle-soar and categorizes them by the service that generated the log.

To access Google SecOps SOAR logs, do the following:

  1. In the Google Cloud console, go to Logging > Logs Explorer.

    Go to Logs Explorer

  2. Select the Google SecOps Google Cloud project.

  3. Enter the following filter in the query field and click Run Query:

    resource.labels.namespace_name="chronicle-soar"
    

    Logs Explorer showing a filter for the chronicle-soar namespace.

  4. To filter logs from a specific service, enter the following filters in the query field and click Run Query:

    resource.labels.namespace_name="chronicle-soar"
    resource.labels.container_name="<CONTAINER_NAME>"
    

    Replace <CONTAINER_NAME> with the relevant service container: playbook, python, or etl.

Playbook step debugging

You can view execution logs for an individual playbook step directly from the Playbook tab in the Cases page. This lets you inspect the logic and outcome of every step, regardless of its execution status.

To view logs for a specific step:

  1. In the Case View, open the Playbook tab.
  2. Select a step to view its results.
  3. Click View Logs Explorer.

    The link opens the Logs Explorer in the Google Cloud console with a pre-configured filter for the specific execution ID of that step.

Filter logs using labels

Log labels provide an efficient and convenient way to refine a query scope. You can find all labels in the labels section of each log message.

Log labels shown within a log message in Logs Explorer.

To narrow the log scope, expand the log message, right-click each label, and hide or show specific logs:

Filtering options available when right-clicking a label in Logs Explorer.

Playbook log labels

The following labels are available for the playbooks:

  • playbook_definition
  • playbook_name
  • block_name
  • block_definition
  • case_id
  • correlation_id
  • integration_name
  • action_name

Python log labels

The following labels are available for the Python service, filtered by resource.labels.container_name="python":

Integration and Connector labels

  • integration_name
  • integration_version
  • connector_name
  • connector_instance

Job labels

  • integration_name
  • integration_version
  • job_name

Action labels

  • integration_name
  • integration_version
  • integration_instance
  • correlation_id
  • action_name

ETL log labels

The following labels are available for the ETL service, filtered by resource.labels.container_name="etl":

  • correlation_id

For example, to trace the ingestion flow for an alert, filter by correlation_id:

Example filter in Logs Explorer using correlation_id for ETL logs.

Need more help? Get answers from Community members and Google SecOps professionals.