[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eThis guide provides instructions for collecting CloudPassage Halo logs and ingesting them into Google SecOps using a Logstash parser.\u003c/p\u003e\n"],["\u003cp\u003eThe Logstash parser transforms CloudPassage Halo JSON log data into a unified data model (UDM), extracting fields, normalizing timestamps, and enriching events.\u003c/p\u003e\n"],["\u003cp\u003eConfiguring an API key within CloudPassage Halo is required, involving accessing the "API Keys" tab in the "Site Administration" section.\u003c/p\u003e\n"],["\u003cp\u003eThe guide outlines the steps to set up a new feed in Google SecOps, specifying the feed name, source type, log type, and API credentials for CloudPassage integration.\u003c/p\u003e\n"],["\u003cp\u003eA detailed UDM mapping table demonstrates how various CloudPassage Halo log fields are translated and mapped to corresponding UDM fields, including their logic for each mapping.\u003c/p\u003e\n"]]],[],null,["# Collect CloudPassage Halo logs\n==============================\n\nSupported in: \nGoogle secops [SIEM](/chronicle/docs/secops/google-secops-siem-toc)\n| **Note:** This feature is covered by [Pre-GA Offerings Terms](https://chronicle.security/legal/service-terms/) of the Google Security Operations Service Specific Terms. Pre-GA features might have limited support, and changes to pre-GA features might not be compatible with other pre-GA versions. For more information, see the [Google SecOps Technical Support Service guidelines](https://chronicle.security/legal/technical-support-services-guidelines/) and the [Google SecOps Service Specific Terms](https://chronicle.security/legal/service-terms/).\n\nThis Logstash parser code transforms CloudPassage Halo JSON log data into a unified data model (UDM). It extracts relevant fields from the raw logs, normalizes timestamps, maps data to UDM fields, and enriches events with additional context like severity and user information.\n\nBefore you begin\n----------------\n\nEnsure that you have the following prerequisites:\n\n- Google SecOps instance.\n- Privileged access to CloudPassage Halo.\n\nConfiguring an API key in CloudPassage\n--------------------------------------\n\n1. Sign in to CloudPassage Halo.\n2. Go to **Settings** \\\u003e **Site Administration**.\n3. Click the **API Keys** tab.\n4. Click **Actions** \\\u003e **New Api Key**.\n5. Click **Show** for your key on the **API Keys** tab to display values.\n6. Copy both the **Key ID** and the **Secret Key** values.\n\nSet up feeds\n------------\n\nTo configure a feed, follow these steps:\n\n1. Go to **SIEM Settings** \\\u003e **Feeds**.\n2. Click **Add New Feed**.\n3. On the next page, click **Configure a single feed**.\n4. In the **Feed name** field, enter a name for the feed (for example, **CloudPassage Logs**).\n5. Select **Third party API** as the **Source type**.\n6. Select **Cloud Passage** as the **Log type**.\n7. Click **Next**.\n8. Specify values for the following input parameters:\n - **Username** : enter the **Key ID**.\n - **Secret** : enter the **Secret Key**.\n - **Event Types**: type of events to include (if you don't specify event types, default events from the list will be used).\n9. Click **Next**.\n10. Review the feed configuration in the **Finalize** screen, and then click **Submit**.\n\nUDM Mapping Table\n-----------------\n\n**Need more help?** [Get answers from Community members and Google SecOps professionals.](https://security.googlecloudcommunity.com/google-security-operations-2)"]]