找到 config.yaml 文件。通常,它位于 Linux 上的 /etc/bindplane-agent/ 目录中或 Windows 上的安装目录中。
使用文本编辑器(例如 nano、vi 或记事本)打开该文件。
按如下方式修改 config.yaml 文件:
receivers:tcplog:# Replace the port and IP address as requiredlisten_address:"0.0.0.0:5145"exporters:chronicle/chronicle_w_labels:compression:gzip# Adjust the path to the credentials file you downloaded in Step 1creds_file_path:'/path/to/ingestion-authentication-file.json'# Replace with your actual customer ID from Step 2customer_id:<customer_id>
endpoint:malachiteingestion-pa.googleapis.com# Add optional ingestion labels for better organizationingestion_labels:log_type:'F5_AFM'raw_log_field:bodyservice:pipelines:logs/source0__chronicle_w_labels-0:receivers:-tcplogexporters:-chronicle/chronicle_w_labels
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# Collect F5 AFM logs\n===================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n| **Note:** This feature is covered by [Pre-GA Offerings Terms](https://chronicle.security/legal/service-terms/) of the Google Security Operations Service Specific Terms. Pre-GA features might have limited support, and changes to pre-GA features might not be compatible with other pre-GA versions. For more information, see the [Google SecOps Technical Support Service guidelines](https://chronicle.security/legal/technical-support-services-guidelines/) and the [Google SecOps Service Specific Terms](https://chronicle.security/legal/service-terms/).\n\nThis document explains how to ingest F5 Advanced Firewall Management logs to\nGoogle Security Operations using Bindplane. The parser transforms the logs from\neither SYSLOG and CSV or CSV formats into a Unified Data Model (UDM). It first\nattempts to parse the log message using grok patterns specific to the SYSLOG\nformat and if unsuccessful, processes it as a CSV file, extracting and mapping\nfields to the UDM structure.\n\nBefore you begin\n----------------\n\nMake sure you have the following prerequisites:\n\n- Google SecOps instance\n- Windows 2016 or later, or a Linux host with `systemd`\n- If running behind a proxy, firewall [ports](/chronicle/docs/ingestion/use-bindplane-agent#verify_the_firewall_configuration) are open\n- Privileged access to F5 BIG-IP and F5 Advanced Firewall Management\n\nGet Google SecOps ingestion authentication file\n-----------------------------------------------\n\n1. Sign in to the Google SecOps console.\n2. Go to **SIEM Settings \\\u003e Collection Agents**.\n3. Download the **Ingestion Authentication File**. Save the file securely on the system where Bindplane will be installed.\n\nGet Google SecOps customer ID\n-----------------------------\n\n1. Sign in to the Google SecOps console.\n2. Go to **SIEM Settings \\\u003e Profile**.\n3. Copy and save the **Customer ID** from the **Organization Details** section.\n\nInstall the Bindplane agent\n---------------------------\n\nInstall the Bindplane agent on your Windows or Linux operating system according\nto the following instructions.\n\n### Windows installation\n\n1. Open the **Command Prompt** or **PowerShell** as an administrator.\n2. Run the following command:\n\n msiexec /i \"https://github.com/observIQ/bindplane-agent/releases/latest/download/observiq-otel-collector.msi\" /quiet\n\n### Linux installation\n\n1. Open a terminal with root or sudo privileges.\n2. Run the following command:\n\n sudo sh -c \"$(curl -fsSlL https://github.com/observiq/bindplane-agent/releases/latest/download/install_unix.sh)\" install_unix.sh\n\n### Additional installation resources\n\nFor additional installation options, consult the [installation guide](/chronicle/docs/ingestion/use-bindplane-agent#install_the_bindplane_agent).\n\nConfigure the Bindplane Agent to ingest Syslog and send to Google SecOps\n------------------------------------------------------------------------\n\n1. Access the configuration file:\n - Locate the `config.yaml` file. Typically, it's in the `/etc/bindplane-agent/` directory on Linux or in the installation directory on Windows.\n - Open the file using a text editor (for example, `nano`, `vi`, or Notepad).\n2. Edit the `config.yaml` file as follows:\n\n receivers:\n tcplog:\n # Replace the port and IP address as required\n listen_address: \"0.0.0.0:5145\"\n\n exporters:\n chronicle/chronicle_w_labels:\n compression: gzip\n # Adjust the path to the credentials file you downloaded in Step 1\n creds_file_path: '/path/to/ingestion-authentication-file.json'\n # Replace with your actual customer ID from Step 2\n customer_id: \u003ccustomer_id\u003e\n endpoint: malachiteingestion-pa.googleapis.com\n # Add optional ingestion labels for better organization\n ingestion_labels:\n log_type: 'F5_AFM'\n raw_log_field: body\n\n service:\n pipelines:\n logs/source0__chronicle_w_labels-0:\n receivers:\n - tcplog\n exporters:\n - chronicle/chronicle_w_labels\n\n - Replace the port and IP address as required in your infrastructure.\n - Replace `\u003ccustomer_id\u003e` with the actual Customer ID.\n - Update `/path/to/ingestion-authentication-file.json` to the path where the authentication file was saved in the [Get Google SecOps ingestion authentication file](/chronicle/docs/ingestion/default-parsers/F5-afm#get-auth-file) section.\n\nRestart the Bindplane agent to apply the changes\n------------------------------------------------\n\n- To restart the Bindplane agent in Linux, run the following command:\n\n sudo systemctl restart bindplane-agent\n\n- To restart the Bindplane agent in Windows, you can either use the **Services**\n console or enter the following command:\n\n net stop BindPlaneAgent && net start BindPlaneAgent\n\nEnable F5 BIG-IP Advanced Firewall Manager\n------------------------------------------\n\n1. Sign in to the **BIG-IP appliance** management console.\n2. Go to **System \\\u003e License**.\n3. Verify that the **Advanced Firewall Manager** is **licensed** and **enabled**.\n4. To enable the **Advanced Firewall Manager** , go to **System \\\u003e Resource \\\u003e Provisioning**.\n5. Select the checkbox From the **Provisioning column** and select **Nominal** from the list.\n6. Click **Submit**.\n\nConfigure Logging Pool in F5 AFM\n--------------------------------\n\n1. Go to **Local Traffic \\\u003e Pools**.\n2. Click **Create**.\n3. Provide the following configuration details:\n - **Name** : Enter a name for the logging pool (for example, **logging_pool**).\n - **Health Monitor** : In the **Available** list, select **TCP** and click **\\\u003c\\\u003c**.\n4. In the **Resource** tab, select the **Logging Pool** you created earlier from the **Node Name** list.\n5. In the **Address** field, enter the Bindplane agent IP address.\n6. In the **Service Port** field, enter `5145` or other port as you defined in the Bindplane agent.\n7. Click **Add**.\n8. Click **Finish**.\n\nConfigure the formatted log destination in F5 AFM\n-------------------------------------------------\n\n1. Go to **System \\\u003e Logs \\\u003e Configuration \\\u003e Log Destinations**.\n2. Click **Create**.\n3. Provide the following configuration details:\n - **Name** : Enter a name for the logging format destination (for example, `Logging_Format_Destination`).\n - **Description**: Enter a description.\n - **Type** : Select **Remote Syslog**.\n - **Syslog Format** : Select **Syslog**.\n - **High-Speed Log Destination** : Select your high-speed logging destination (for example, `Logging_HSL_Destination`).\n4. Click **Finished**.\n\nConfigure Log Publisher in F5 AFM\n---------------------------------\n\n1. Go to **System \\\u003e Logs \\\u003e Configuration \\\u003e Log Publishers**.\n2. Click **Create**.\n3. Provide the following configuration details:\n - **Name** : Enter a name for the publisher (for example, `Log_Publisher`).\n - **Description**: Enter a description.\n - **Destinations** : Select the **log destination name** that you created in the **Configure Logging Pool in F5 AFM** step and click **\\\u003c\\\u003c** to add items to the **Selected** list.\n\nConfigure Logging Profile in F5 AFM\n-----------------------------------\n\n1. Go to **Security \\\u003e Event Logs \\\u003e Logging Profile**.\n2. Click **Create**.\n3. Provide the following configuration details:\n - **Name** : Enter a name for the log profile (for example, **Logging_Profile**).\n - **Network Firewall** : Select the **Enabled** checkbox.\n - **Publisher** : Select the **log publisher** that you configured earlier (for example, `Log_Publisher`).\n - **Log Rule Matches** : Select the **Accept, Drop, and Reject** checkboxes.\n - **Log IP Errors** : Select the **Enabled** checkbox.\n - **Log TCP Errors** : Select the **Enabled** checkbox.\n - **Log TCP Events** : Select the **Enabled** checkbox.\n - **Storage Format** : Select **Field-List**.\n - **Delimiter** : Enter `,` (comma) as the delimiter for events.\n - **Storage Options** : Select **all of the options** in the **Available Items** list and click **\\\u003c\\\u003c**.\n - In the **IP Intelligence** tab, select the **log publisher** that you configured (for example, `Log_Publisher`).\n4. Click **Finished**.\n\nConfigure Virtual Server Profile Association in F5 AFM\n------------------------------------------------------\n\n1. Go to **Local Traffic \\\u003e Virtual Servers**.\n2. Select the **virtual server** to modify.\n3. Go to the **Security tab \\\u003e Policies**.\n4. From the **Log Profile** list, select **Enabled**.\n5. From the **Profile** field, select **Logging_Profile** and click **\\\u003c\\\u003c**.\n6. Click **Update**.\n\nUDM mapping table\n-----------------\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]