Auto Extraction overview
This document provides an overview of how data is automatically extracted to enhance the ability to ingest, process, and analyze data.
Google Security Operations uses prebuilt parsers to extract and structure log data using the Unified Data Model (UDM) schema. Managing and maintaining these parsers can be challenging due to several limitations: incomplete data extraction, the growing number of parsers to manage, and the requirement for frequent updates as log formats evolve.
To address these challenges, you can use the auto extraction
feature. This feature automatically extracts key-value pairs from JSON-formatted
logs ingested into Google SecOps. This extracted data is stored in a UDM, map-type
field called extracted
. You can then use this data within UDM search queries,
Preview Dashboards, and YARA-L
rules. Autonomous parsing supports JSON format logs.
As a best practice, the UDM searches using extracted fields must include metadata.log_type
in their query to improve search query performance.
The benefit of auto extraction is reduced reliance on parsers, ensuring that data remains available, even when a parser is not present or fails to parse a log.
Parse and extract data from the raw log
Parsing: Google SecOps attempts to parse logs using a parser specific to the log type, if available. If no specific parser exists, or if parsing fails, Google SecOps uses a general parser to extract basic information like ingested timestamp, log type, and metadata labels.
Data Extraction: All data points are automatically extracted from the logs.
Event Enrichment: Google SecOps combines the parsed data and any custom-formatted fields to create enriched events, providing more context and detail.
Downstream Data Transfer: These enriched events are then sent to other systems for further analysis and processing.
Work with extractors
Extractors let you extract fields from high-volume log sources, and are designed to optimize log management. By using extractors, you can reduce event size, enhance parsing efficiency, and gain better control over data extraction. This is especially useful for managing new log types or minimizing processing time.
You can create extractors using the SIEM Settings menu or by performing a raw log search.
Create extractors
Go to the Extract Additional Fields pane using either of the following methods:
- Click SIEM Settings > Parsers, and do the following:
- In the PARSERS table that appears, identify a parser (log source) and click Menu > Extend Parser > Extract Additional Fields.
- Use Raw Log Scan and
do the following:
- Select the required log sources (parsers) from the Log Sources menu.
- From the raw log results, select a log source to open the EVENT DATA pane.
- In the EVENT DATA pane, click Manage Parser > Extend Parser > Extract Additional Fields.
- Use UDM search
and do the following:
- On the EVENTS tab in the UDM search results, select a log source to view the Event Viewer pane.
- On the Raw Log tab, click Manage Parser > Extend Parser > Extract Additional Fields.
- Click SIEM Settings > Parsers, and do the following:
On the Select Extractors tab in the Extract Additional fields pane, select the required raw log fields. By default, you can select up to 100 fields. If no additional fields are available for extraction, a warning notice displays.
Click the Reference Raw Log tab to view the raw log data and preview the UDM output.
Click Save.
The newly created extractor is labeled as EXTRACTOR
.
Extracted fields are displayed in the UDM output asextracted.field{"fieldName"}
.
View extractor details
- Go to the extractor row in the PARSERS table and click Menu > Extend Parser > View Extension.
- On the VIEW CUSTOM PARSERS page, click the Extensions and Extracted Fields tab.
This tab displays information on parser extensions and extractor fields. You can modify or remove fields and preview the parser output from the VIEW CUSTOM PARSERS page.
Need more help? Get answers from Community members and Google SecOps professionals.