Collect Google SecOps SOAR logs
You can manage and monitor Google Security Operations SOAR logs in the Google Cloud Logs Explorer. You can also use Google Cloud tools to set up special metrics and alerts that are triggered by specific events in your SOAR operation logs.
The logs capture essential data from SOAR's ETL, playbook, and Python functions. The types of captured data include the running of Python scripts, alert ingestion, and playbook performance.
Access Google SecOps SOAR logs
Google SecOps SOAR logs are written in a separate namespace called chronicle-soar and are categorized by the service which generated the log.
To access Google SecOps SOAR logs, do the following:
- In the Google Cloud console, go to Logging > Logs Explorer.
- Select the Google SecOps Google Cloud project.
Enter the following filter in the field and click Run Query:
resource.labels.namespace_name="chronicle-soar"
To filter logs from a specific service, enter the following filters in the box and click Run Query:
resource.labels.namespace_name="chronicle-soar" resource.labels.container_name="<container_name>"where the values include
playbook,pythonoretl.
Playbook labels
Playbook log labels provide a more efficient and convenient way to refine a query scope. All labels are located in the labels section of each log message:

To narrow the log scope, expand the log message, right-click each label, and hide or show specific logs:

The following labels are available:
playbook_definitionplaybook_nameblock_nameblock_definitioncase_idcorrelation_idintegration_nameaction_name
Python logs
The following logs are available for python service:
resource.labels.container_name="python"
Integration and Connector labels:
integration_nameintegration_versionconnector_nameconnector_instance
Job labels:
integration_nameintegration_versionjob_name
Action labels:
integration_nameintegration_versionintegration_instancecorrelation_idaction_name
ETL logs
The following logs are available for ETL service:
resource.labels.container_name="etl"
ETL labels:
correlation_id
For example, to provide the ingestion flow for an alert, filter by
correlation_id:

Need more help? Get answers from Community members and Google SecOps professionals.