Skip to content
View v-hkopparala's full-sized avatar

Block or report v-hkopparala

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
v-hkopparala/README.md

Integrating Google Cloud Platform IAM into Microsoft Sentinel

Table of contents

The Google Cloud Platform IAM Codeless Connector for Microsoft Sentinel enables seamless integration of Google Cloud Platform's IAM logs with Microsoft Sentinel without the need for custom code. Developed as part of the Codeless Conector Platform(CCP), this connector simplifies the process of collecting and ingesting IAM query logs and IAM audit logs from Google Cloud Platform into Sentinel.

The below mentioned resources are required to connect GCP with Sentinel.

  • Project ID
  • Project Number
  • GCP Subscription Name
  • Workload Identity Pool ID
  • Service Account
  • Workload Identity Provider ID

To generate the above resources, you must execute the following terraform scripts.

  • Log Setup File
  • Authentication setup file

To access the terraform script for Log Setup Click here

  • After accessing the log setup file, edit the project id as per your project.
  • Launch the cloud shell in Google Cloud Console.
  • Execute the below mentioned commands.
  • create a directory
    mkdir <dir_name>
    
  • Navigate to the directory
    cd <dir_name>
    
  • Copy the github raw link of the Terraform script and get the content of the file into a shell using the following command:
    wget <raw link of the file> -O <filename.tf>
    
  • Initializes your terraform working directory, downloads provider plugins, and configures the backend for state storage.
    terraform init
    
  • Creates an execution plan to show what actions terraform will take to achieve the desired state of your infrastructure.
    terraform plan
    
  • Executes the actions proposed in the Terraform plan to create, update, or destroy resources in your infrastructure.
    terraform apply
    
  • After successfully executing the Log Setup file, topic name, subscription name is generated in the GCP Project. Save those details for future reference.
  • If the Authentication setup file is previously executed in the project, there is no need to execute the Authentication setup file again. You can use the existing Workload Identity Pool ID and Workload Identity Provider ID for authentication purpose.
  • If these fields are not generated previosuly, execute the Authentication Setup file.
  • To access the Authentication Setup file Click Here.
  • To Execute the Authentication Setup file Click Here.
  • After executing the authentication setup file, Workload Identity Pool ID and Workload Identity Provider ID are generated in the project.

Popular repositories Loading

  1. v-hkopparala v-hkopparala Public

    HCL

  2. Spoon-Knife Spoon-Knife Public

    Forked from octocat/Spoon-Knife

    For testing purpose

    HTML

  3. Sampleforks1 Sampleforks1 Public

    Forked from octocat/octocat.github.io

    test

    CSS