Collect Fluentd logs
This document describes how you can collect Fluentd logs by configuring Fluentd and a Google Security Operations forwarder. This document also lists the supported log types and supported Fluentd version.
For more information, see Data ingestion to Google Security Operations.
Overview
The following deployment architecture diagram shows how Fluentd is installed on forwarder server and aggregator server to send logs to Google Security Operations. Each customer deployment might differ from this representation and might be more complex.
The architecture diagram shows the following components:
Linux system. The Linux system to be monitored. The Linux system consists of the files to monitor and the Fluentd forwarder server.
Microsoft Windows system. The Microsoft Windows system to be monitored in which the Fluentd forwarder server is installed.
Fluentd forwarder. The Fluentd forwarder collects information from the Microsoft Windows or Linux system and forwards the information to the Fluentd aggregator.
Fluentd aggregator. The Fluentd aggregator receives logs from the Fluentd forwarder and forwards the logs to the Google Security Operations forwarder.
Google Security Operations forwarder. The Google Security Operations forwarder is a lightweight software component, deployed in the customer's network, that supports syslog. The Google Security Operations forwarder forwards the logs to Google Security Operations.
Google Security Operations. Google Security Operations retains and analyzes the logs from the Fluentd aggregator.
An ingestion label identifies the parser which normalizes raw log data
to structured UDM format. The information in this document applies to the parser
with the FLUENTD
ingestion label.
Before you begin
Ensure that the Fluentd forwarder is installed on the Microsoft Windows or Linux systems that you plan to monitor. For more information about installing the Fluentd forwarder, see Fluentd installation
Use a Fluentd version that the Google Security Operations parser supports. The Google Security Operations parser supports Fluentd version 1.0.
Ensure that the Fluentd aggregator is installed and configured on the central Linux server.
Ensure that all systems in the deployment architecture are configured in the UTC time zone.
Verify the log types that the Google Security Operations parser supports. The following table list the products and log file paths that the Google Security Operations parser supports:
Operating system Product Log file path Microsoft Windows Microsoft Windows Event logs Linux Linux /var/log/audit/audit.log Linux Linux /var/log/syslog Linux apache2 /var/log/apache2/access.log Linux apache2 /var/log/apache2/error.log Linux apache2 /var/log/apache2/other_vhosts_access.log Linux apache2 /var/log/apache2/novnc-server-access.log Linux OpenVpn /var/log/openvpnas.log Linux Nginx /var/log/nginx/access.log Linux Nginx /var/log/nginx/error.log Linux rkhunter /var/log/rkhunter.log Linux Linux /var/log/auth.log Linux Linux /var/log/kern.log Linux rundeck /var/log/rundeck/service.log Linux Samba /var/log/samba/log.winbindd Linux Linux /var/log/mail.log
Configure the Fluentd forwarder and aggregator, and the Google Security Operations forwarder
To monitor the logs that the Linux systems generate, create a
td-agent.conf
file to specify the log monitoring configuration for the Fluentd forwarder. Here is an example configuration file for the Fluentd forwarder on the Linux system:<source> @type tail path /var/log/nginx/access.log pos_file /var/log/td-agent/nginx-access.log.pos tag mytag.nginx.access <parse> @type none </parse> </source> <source> @type tail path /var/log/nginx/error.log pos_file /var/log/td-agent/nginx-error.log.pos tag mytag.nginx.error <parse> @type none </parse> </source> <source> @type tail path /var/log/apache2/access.log pos_file /var/log/td-agent/apache-access.log.pos tag mytag.apache.access <parse> @type none </parse> </source> <source> @type tail path /var/log/apache2/error.log pos_file /var/log/td-agent/apache-error.log.pos tag mytag.apache.error <parse> @type none </parse> </source> <source> @type tail path /var/log/audit/audit.log pos_file /var/log/td-agent/audit.log.pos tag mytag.audit <parse> @type none </parse> </source> <source> @type tail path /var/log/syslog/syslog.log pos_file /var/log/td-agent/syslog.log.pos tag mytag.syslog <parse> @type none </parse> </source> <source> @type tail path /var/log/apache2/other_vhosts_access.log pos_file /var/log/td-agent/vhost.log.pos tag mytag.apache.other_vhosts_access <parse> @type none </parse> </source> <source> @type tail path /var/log/apache2/novnc-server-access.log pos_file /var/log/td-agent/novnc.log.pos tag mytag.apache.novnc-server-access <parse> @type none </parse> </source> <source> @type tail path /var/log/openvpnas.log pos_file /var/log/td-agent/openvpnas.log.pos tag mytag.openvpnas <parse> @type none </parse> </source> <source> @type tail path /var/log/auth.log pos_file /var/log/td-agent/auth.log.pos tag mytag.auth <parse> @type none </parse> </source> <source> @type tail path /var/log/kern.log pos_file /var/log/td-agent/kern.log.pos tag mytag.kern <parse> @type none </parse> </source> <source> @type tail path /var/log/rundeck/service.log pos_file /var/log/td-agent/rundeck.log.pos tag mytag.rundeck <parse> @type none </parse> </source> <source> @type tail path /var/log/mail.log pos_file /var/log/td-agent/mail.log.pos tag mytag.mail <parse> @type none </parse> </source> <source> @type tail path /var/log/rkhunter.log pos_file /var/log/td-agent/rkhunter.log.pos tag mytag.rkhunter <parse> @type none </parse> </source> <source> @type tail Path /var/log/samba/log.winbindd pos_file /var/log/td-agent/winbindd.log.pos tag mytag.winbindd <parse> @type none </parse> </source> <filter mytag.**> @type record_transformer <record> forwarder_hostname "#{Socket.gethostname}" </record> </filter> <filter mytag.nginx.access.**> @type record_transformer <record> path "/var/log/nginx/access.log" </record> </filter> <filter mytag.nginx.error.**> @type record_transformer <record> path "/var/log/nginx/error.log" </record> </filter> <filter mytag.apache.access.**> @type record_transformer <record> path "/var/log/apache2/access.log" </record> </filter> <filter mytag.apache.error.**> @type record_transformer <record> path "/var/log/apache2/error.log" </record> </filter> <filter mytag.audit.**> @type record_transformer <record> path "/var/log/audit/audit.log" </record> </filter> <filter mytag.syslog.**> @type record_transformer <record> path "/var/log/syslog/syslog.log" </record> </filter> <filter mytag.apache.other_vhosts_access.**> @type record_transformer <record> path "/var/log/apache2/other_vhosts_access.log" </record> </filter> <filter mytag.apache.novnc-server-access.**> @type record_transformer <record> path "/var/log/apache2/novnc-server-access.log" </record> </filter> <filter mytag.openvpnas.**> @type record_transformer <record> path "/var/log/openvpnas.log" </record> </filter> <filter mytag.auth.**> @type record_transformer <record> path "/var/log/auth.log" </record> </filter> <filter mytag.kern.**> @type record_transformer <record> path "/var/log/kern.log" </record> </filter> <filter mytag.rundeck.**> @type record_transformer <record> path "/var/log/rundeck/service.log" </record> </filter> <filter mytag.mail.**> @type record_transformer <record> path "/var/log/mail.log" </record> </filter> <filter mytag.rkhunter.**> @type record_transformer <record> path "/var/log/rkhunter.log" </record> </filter> <filter mytag.winbindd.**> @type record_transformer <record> path "/var/log/samba/log.winbindd" </record> </filter> <match mytag.**> @type forward # primary host <server> host <AGGREGATOR_HOSTNAME> port <AGGREGATOR_PORT> </server> </match>
To monitor the logs that the Microsoft Windows systems generate, create a
td-agent.conf
file to specify the log monitoring configuration for the Fluentd forwarder. Here is an example configuration file for the Fluentd forwarder on the Microsoft Windows system:<source> @type windows_eventlog @id windows_eventlog channels application,security,system read_existing_events true read_interval 2 tag windows.raw render_as_xml true <storage> @type local persistent true path E:\windows.pos </storage> </source> <match windowslog> @type forward <server> host <AGGREGATOR_HOSTNAME> port <AGGREGATOR_PORT> username <AGGREGATOR_USERNAME> password <AGGREGATOR_PASSWORD> </server> </match>
To forward the logs from the Fluentd aggregator to the Google Security Operations forwarder, create a configuration file in the following format:
<source> @type forward port <AGGREGATOR_PORT> </source> ## Forwarding <match mytag.**> @id output_system_forward @type forward # IP and port of the forwarder <server> host <CHRONICLE_FORWARDER_HOSTNAME> port <CHRONICLE_FORWARDER_PORT> </server> </match>
Configure the Google Security Operations forwarder to send logs to Google Security Operations. For more information, see Installing and configuring the forwarder on Linux. The following is an example of a Google Security Operations forwarder configuration:
common: enabled: true data_type: FLUENTD batch_n_seconds: 10 batch_n_bytes: 1048576 tcp_address: 0.0.0.0:10514 connection_timeout_sec: 60
Field mapping reference
This section explains how the parser applies grok patterns for Linux and Microsoft Windows systems and how it maps Fluentd log fields to Google Security Operations Unified Data Model (UDM) fields for each log type.
For information about mapping reference of common fields, see Common fields
For reference information about log paths, grok patterns for example logs, event types, and UDM fields on Linux systems, refer to the following sections:
For information about supported Microsoft Windows events and the corresponding UDM fields, see Microsoft Windows events data
Common fields
The following table lists the common log fields and their corresponding UDM fields.
Common log field | UDM field |
---|---|
collected_time | metadata.collected_timestamp |
inner_message.message | inner_message |
inner_message.forwarder_hostname | target.hostname or principal.hostname |
inner_message.path | event_source |
Linux system
The following table lists the log paths for Linux system, grok pattern for example logs, event type, and UDM mappings:
Log path | Example log | Grok pattern | Event type | UDM mapping |
---|---|---|---|---|
/var/log/apache2/error.log | [Thu Apr 28 16:13:01.283342 2022] [core:notice] [pid 18394:tid 140188660751296] [client 1.200.32.47:59840] failed to make connection | [{timestamp}][{log_module}:{log_level}][pid{pid}(<optional_field>:tid{tid}|)](<optional_field> [client {client_ip}:{client_port}]|) (?<error_message>.*) | NETWORK_UNCATEGORIZED | timestamp is mapped to metadata.event_timestamp log_module is mapped to target.resource.name log_level is mapped to security_result.severity pid is mapped to target.process.parent_process.pid tid is mapped to target.process.pid client_ip is mapped to principal.ip client_port is mapped to principal.port error_message is mapped to security_result.description network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/error.log | [Thu Apr 28 16:13:01.283342 2022] [core:notice] [pid 18394:tid 140188660751296] failed to make connection | [{timestamp}][{log_module}:{severity}][pid{pid}(<optional_field>:tid{tid}|)]{error_message} | NETWORK_UNCATEGORIZED | timestamp is mapped to metadata.event_timestamp log_module is mapped to target.resource.name log_level is mapped to security_result.severity pid is mapped to target.process.parent_process.pid tid is mapped to target.process.pid error_message is mapped to security_result.description network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/error.log | [Thu Apr 28 16:13:01.283342 2022] [core:notice] [pid 18394:tid 140188660751296] AH00094: Command line: '/usr/sbin/apache2' | [{timestamp}][{log_module}:{log_level}][pid{pid}(<optional_field>:tid{tid}|)](<optional_field> [client {client_ip}:{client_port}]|) (?<error_message>.*),referer{referer_url} | NETWORK_UNCATEGORIZED | metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" timestamp is mapped to metadata.event_timestamp log_module is mapped to target.resource.name log_level is mapped to security_result.severity pid is mapped to target.process.parent_process.pid tid is mapped to target.process.pid client_ip is mapped to principal.ip client_port is mapped to principal.port error_message is mapped to security_result.description target.platform is set to "LINUX" referer_url is mapped to network.http.referral_url |
/var/log/apache2/error.log | [Sun Jan 30 15:14:47.260309 2022] [proxy_http:error] [pid 12515:tid 140035781285632] [client 1.200.32.47:59840] AH01114: HTTP: failed to make connection to backend: 192.0.2.1 , referer http:// | [{timestamp}] [{log_module}:{log_level}] [pid {pid}(<optional_field>:tid{tid}|)] [client {client_ip}:{client_port}]( <message_text>HTTP: )?{error_message}:( {target_ip})(<optional_field>,referer{referer_url})?" | NETWORK_HTTP | timestamp is mapped to metadata.event_timestamp log_module is mapped to target.resource.name log_level is mapped to security_result.severity pid is mapped to target.process.parent_process.pid tid is mapped to target.process.pid client_ip is mapped to principal.ip client_port is mapped to principal.port error_message is mapped to security_result.description target_ip is mapped to target.ip referer_url is mapped to network.http.referral_url network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/error.log | [Sat Feb 02 00:30:55 2019] New connection: [connection: gTxkX8Z6tjk] [client 192.0.2.1:50786] | [{timestamp}]<message_text>connection:[connection:{connection_id}][client{client_ip}:{client_port}] | NETWORK_UNCATEGORIZED | timestamp is mapped to metadata.event_timestamp client_ip is mapped to principal.ip client_port is mapped to principal.port connection_id is mapped to network.session_id network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/error.log | [Sat Feb 02 00:30:55 2019] New request: [connection: j8BjX4Z5tjk] [request: ACtkX1Z5tjk] [pid 8] [client 192.0.2.1:50784] | [{timestamp}]<message_text>request:[connection:{connection_id}][request:{request_id}][pid{pid}][client{client_ip}:{client_port}] | NETWORK_UNCATEGORIZED | timestamp is mapped to metadata.event_timestamp request_id is mapped to security_result.detection_fields.(key/value) client_ip is mapped to principal.ip client_port is mapped to principal.port pid is mapped to target.process.parent_process.pid connection_id is mapped to network.session_id network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/error.log | [Sat Feb 02 00:30:55 2019] [info] [C: j8BjX4Z5tjk] [R: p7pjX4Z5tjk] [pid 8] core.c(4739): [client 192.0.2.1:50784] AH00128: File does not exist: /usr/local/apache2/htdocs/favicon.ico | [{timestamp}] [{log_level}][C:{connection_id}][R:{request_id}][pid {pid}(<optional_field>:tid{tid}|)]<message_text>[client {client_ip}:{client_port}]{error_message}:{file_path} | NETWORK_UNCATEGORIZED | timestamp is mapped to metadata.event_timestamp log_level is mapped to security_result.severity request_id is mapped to security_result.detection_fields.(key/value) client_ip is mapped to principal.ip client_port is mapped to principal.port pid is mapped to target.process.parent_process.pid connection_id is mapped to network.session_id error_message is mapped to security_result.description file_path is mapped to target.file.full_path network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/access.log | 192.0.2.1 - - [28/Apr/2022:17:35:52 +0530] "GET / HTTP/1.1" 200 3476 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/192.0.2.1 Safari/537.36" | ({client_ip})?<message_text>{userid}[{timestamp}](<optional_field>{method}/(<optional_field>{resource}?) {client_protocol}?){result_status}{object_size}(<optional_field>(<optional_field>{referer_url}?)(<optional_field>{user_agent}?)? | NETWORK_HTTP | client_ip is mapped to principal.ip userid is mapped to principal.user.userid host is mapped to principal.hostname timestamp is mapped to metadata.event_timestamp method is mapped to network.http.method resource is mapped to principal.resource.name client_protocol is mapped to network.application_protocol result_status is mapped to network.http.response_code object_size is mapped to network.sent_bytes referer_url is mapped to network.http.referral_url user_agent is mapped to network.http.user_agent network.ip_protocol is set to "TCP" network.direction is set to "OUTBOUND" network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
var/log/apache2/other_vhosts_access.log | wintest.example.com:80 ::1 - - [14/Jan/2022:14:08:16 -0700] \"GET /server-status?auto HTTP/1.1\" 200 1415 \"-\" \"Python-urllib/2.7\" | {target_host}:{NUMBER:target_port} {client_ip} - (<optional_field>{host}?) [{timestamp}](<optional_field>{method}/(<optional_field>{resource}?){client_protocol}?){result_status}{object_size}(<optional_field>{referer_url}?)(<optional_field>{user_agent}?) | NETWORK_HTTP | target_host is mapped to target.hostname
target_port is mapped to target.port client_ip is mapped to principal.ip userid is mapped to principal.user.userid host is mapped to principal.hostname timestamp is mapped to metadata.event_timestamp method is mapped to network.http.method resource is mapped to principal.resource.name result_status is mapped to network.http.response_code object_size is mapped to network.sent_bytes referer_url is mapped to network.http.referral_url user_agent is mapped to network.http.user_agent network.ip_protocol is set to "TCP" network.direction is set to "OUTBOUND" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" network.application_protocol is set to "HTTP" |
var/log/apache2/novnc-server-access.log | wintest.example.com:80 ::1 - - [14/Jan/2022:14:08:16 -0700] \"GET /server-status?auto HTTP/1.1\" 200 1415 \"-\" \"http://\" | {target_host}:{NUMBER:target_port} {client_ip} - (<optional_field>{host}?) [{timestamp}](<optional_field>{method}/(<optional_field>{resource}?){client_protocol}?){result_status}{object_size}(<optional_field>{referer_url}?)(<optional_field>{user_agent}?) | NETWORK_HTTP | client_ip is mapped to principal.ip userid is mapped to principal.user.userid method is mapped to network.http.method path is mapped to target.url result_status is mapped to network.http.response_code object_size is mapped to network.sent_bytes referer_url is mapped to network.http.referral_url user_agent is mapped to network.http.user_agent network.ip_protocol is set to "TCP" network.direction is set to "OUTBOUND" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" network.application_protocol is set to "HTTP" |
/var/log/apache2/access.log | "http://192.0.2.1/test/first.html" -> /google.com | (<optional_field>{referer_url}?)->(<optional_field>{path}?) | GENERIC_EVENT | path is mapped to target.url referer_url is mapped to network.http.referral_url network.direction is set to "OUTBOUND" target.platform is set to "LINUX" network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
/var/log/apache2/access.log | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Code/1.67.0 Chrome/98.0.4758.141 Electron/17.4.1 Safari/537.36 | (<optional_field>{user_agent}) | GENERIC_EVENT | user_agent is mapped to network.http.user_agent network.direction is set to "OUTBOUND" target.platform is set to "LINUX" network.application_protocol is set to "HTTP" target.platform is set to "LINUX" metadata.vendor_name is set to "Apache" metadata.product_name is set to "Apache HTTP Server" |
var/log/nginx/access.log | 192.0.2.1 - admin [05/May/2022:11:53:27 +0530] "GET /icons/ubuntu-logo.png HTTP/1.1" 404 209 "http://198.51.100.1/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/192.0.2.1 Safari/537.36" | {principal_ip} - (<optional_field>{principal_user_userid}?) [{timestamp}] {http_method} /(<optional_field>{resource_name}?|) {protocol}(<message_text>){response_code} {received_bytes}(<optional_field>{referer_url}) ({user_agent}|{user_agent})? | NETWORK_HTTP | time is mapped to metadata.timestamp ip is mapped to target.ip principal_ip is mapped to principal.ip principal_user_userid is mapped to principal.user.userid metadata_timestamp is mapped to timestamp http_method is mapped to network.http.method resource_name is mapped to principal.resource.name protocol is mapped to network.application_protocol = (HTTP) response_code is mapped to network.http.response_code received_bytes is mapped to network.sent_bytes referer_url is mapped to network.http.referral_url user_agent is mapped to network.http.user_agent target.platform is set to "LINUX" metadata.vendor_name is set to "NGINX" metadata.product_name is set to "NGINX" network.ip_protocol is set to "TCP" network.direction is set to "OUTBOUND" |
var/log/nginx/error.log | 2022/01/29 13:51:48 [error] 593#593: *62432 open() \"/usr/share/nginx/html/nginx_status\" failed (2: No such file or directory), client: 192.0.2.1, server: localhost, request: \"GET /nginx_status HTTP/1.1\", host: \"192.0.2.1:8080\" | "{year}\/{month}\/{day}{time}[{severity}]{pid}#{thread_id}:{inner_message2}"
inner_message2 is mapped to "{security_result_description_2},client:{principal_ip},server:(<optional_field>{target_hostname}?),request:"{http_method} /(<optional_field>{resource_name}?) {protocol}/1.1",host:"({target_ip}:{target_port})?" "bind() to ({target_ip}|[{target_ip}]):{target_port} failed ({security_description})", "\*{cid}{security_description}", "{security_description}" |
NETWORK_HTTP | thread_id is mapped to principal.process.pid severity is mapped to security_result.severity (debug is mapped to UNKNOWN_SEVERITY, info is mapped to INFORMATIONAL, notice is mapped to LOW, warn is mapped to MEDIUM, error is mapped to ERROR, crit is mapped to CRITICAL, alert is mapped to HIGH) target_file_full_path is mapped to target.file.full_path principal_ip is mapped to principal.ip target_hostname is mapped to target.hostname http_method is mapped to network.http.method resource_name is mapped to principal.resource.name protocol is mapped to "TCP" target_ip is mapped to target.ip target_port is mapped to target.port security_description + security_result_description_2 is mapped to security_result.description pid is mapped to principal.process.parent_process.pid network.application_protocol is set to "HTTP" timestamp is mapped to {year}/{day}/{month} {time} target.platform is set to "LINUX" metadata.vendor_name is set to "NGINX" metadata.product_name is set to "NGINX" network.ip_protocol is set to "TCP" network.direction is set to "OUTBOUND" |
var/log/rkhunter.log | [14:10:40] Required commands check failed | [<message_text>]{security_description} | STATUS UPDATE | time is mapped to metadata.timestamp security_description is mapped to security_result.description principal.platform is set to "LINUX" metadata.vendor_name is set to "RootKit Hunter" metadata.product_name is set to "RootKit Hunter" |
var/log/rkhunter.log | [14:09:52] Checking for file '/dev/.oz/.nap/rkit/terror' [ Not found ] | [<message_text>] {security_description} {file_path}[\{metadata_description}] | FILE_UNCATEGORIZED | metadata_description is mapped to metadata.description
file_path is mapped to target.file.full_path security_description is mapped to security_result.description principal.platform is set to "LINUX" metadata.vendor_name is set to "RootKit Hunter" metadata.product_name is set to "RootKit Hunter" |
var/log/rkhunter.log | fluentd: File size reduced (inode remained): '/var/log/rkhunter.log'. | (<optional_field><message_text>:){metadata_description}:'{file_path}' | FILE_UNCATEGORIZED | time is mapped to metadata.timestamp metadata_description is mapped to metadata.description file_path is mapped to target.file.full_path principal.platform is set to "LINUX" metadata.vendor_name is set to "RootKit Hunter" metadata.product_name is set to "RootKit Hunter" |
/var/log/kern.log | Apr 28 12:41:35 localhost kernel: [ 5079.912215] ctnetlink v0.93: registering with nfnetlink. | {timestamp}{principal_hostname}{metadata_product_event_type}:[<message_text>]{metadata_description} | STATUS UPDATE | timestamp is mapped to "metadata.event_timestamp" principal_hostname is mapped to "principal.hostname" metadata_product_event_type is mapped to "metadata.product_event_type" metadata_description is mapped to "metadata.description" metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" principal.platform is set to "LINUX" |
/var/log/kern.log | Jul 6 11:17:01 Ubuntu18 kernel: [ 0.030139] smpboot: CPU0: Intel(R) Xeon(R) Gold 5220R CPU @ 2.20GHz (family: 0x6, model: 0x55, stepping: 0x7) | {timestamp}{principal_hostname}{metadata_product_event_type}:([<message_text>])<message_text>:\CPU0:{principal_asset_hardware_cpu_model}({metadata_description}) | STATUS_UPDATE | timestamp is mapped to "metadata.event_timestamp" principal_hostname is mapped to "principal.hostname" metadata_product_event_type is mapped to "metadata.product_event_type" principal_asset_hardware_cpu_model is mapped to "principal.asset.hardware.cpu_model" metadata_description is mapped to "metadata.description" metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" principal.platform is set to "LINUX" cpu_model is mapped to principal.asset.hardware.cpu_model |
/var/log/syslog.log | May 24 10:30:42 Ubuntu18 systemd[1]: Started Session 112 of user kajal. | {collected_timestamp}{hostname}{command_line}(<optional_field>[{pid}]):{message} | STATUS_UPDATE | collected_time is mapped to metadata.event_timestamp hostname is mapped to principal.hostname pid is mapped to principal.process.pid message is mapped to metadata.description metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" principal.platform is set to "LINUX" command_line is mapped to principal.process.command_line |
/var/log/syslog.log | Jul 06 10:14:37 Ubuntu18 rsyslogd: rsyslogd's userid changed to 102 | {collected_timestamp}{hostname}{command_line}:{message}to{user_id} | STATUS_UPDATE | collected_time is mapped to metadata.collected_timestamp hostname is mapped to principal.hostname message is mapped to metadata.description user_id is mapped to principal.user.userid command_line is mapped to principal.process.command_line metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" principal.platform is set to "LINUX" |
/var/log/syslog.log | Jul 06 10:36:48 Ubuntu18 systemd[1]: Starting System Logging Service... | {collected_timestamp}{hostname}{command_line}(<optional_field>|[{pid}]):{message} | STATUS_UPDATE | collected_time is mapped to metadata.event_timestamp hostname is mapped to principal.hostname pid is mapped to principal.process.pid message is mapped to metadata.description metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" principal.platform is set to "LINUX" command_line is mapped to principal.process.command_line |
var/log/openvpnas.log | 2022-04-29T10:51:22+0530 [stdout#info] [OVPN 4] OUT: '2022-04-29 05:21:22 mohit_AUTOLOGIN/198.51.100.1:16245 MULTI: Learn: 198.51.100.1 -> mohit_AUTOLOGIN/203.0.113.1:16245' | {timestamp}[stdout#{log_level}][OVPN <message_text>]OUT:(<optional_field>'|")<message_text>-<message_text>{user}\/{ip}:{port}MULTI:Learn:{local_ip}->{target_hostname}?{target_ip}:{port}(<optional_field>'|") | NETWORK_HTTP | timestamp is mapped to metadata.timestamp log_level is mapped to security_result.severity local_ip is mapped to principal.ip target_ip is mapped to target.ip target_hostname is mapped to principal.hostname port is mapped to target.port user is mapped to principal.user.user_display_name metadata.vendor_name is set to "OpenVPN" metadata.product_name is set to "OpenVPN Access Server" principal.platform is set to "LINUX" |
var/log/openvpnas.log | 2022-04-28T16:14:13+0530 [stdout#info] [OVPN 6] OUT: '2022-04-28 16:14:13 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.08' | {timestamp}[stdout#{log_level}][OVPN <message_text>]OUT:(<optional_field>'|")<message_text>{msg}(<optional_field>'|") | STATUS UPDATE | timestamp is mapped to metadata.timestamp log_level is mapped to security_result.severity msg is mapped to security_result.description metadata.vendor_name is set to "OpenVPN" metadata.product_name is set to "OpenVPN Access Server" principal.platform is set to "LINUX" |
var/log/openvpnas.log | 2022-04-28T16:14:13+0530 [stdout#info] [OVPN 6] OUT: '2022-04-28 16:14:13 net_addr_v4_add: 198.51.100.1/23 dev as0t6' | {timestamp}[stdout#{log_level}][OVPN <message_text>]OUT:<optional_field>'|"<message_text>-<message_text>-<message_text><message_text>{message}<optional_field>'|" message is mapped to (net_addr_v4_add|net_route_v4_best_gw):{target_ip}/{target_port} |
STATUS UPDATE | principal.platform is set to "LINUX" target_ip is mapped to target.ip target_port is mapped to target.port severity is mapped to security_result.severity timestamp is mapped to metadata.timestamp metadata.vendor_name is set to OpenVPN metadata.product_name is set to OpenVPN Access Server |
var/log/openvpnas.log | 2022-04-29T10:51:22+0530 [stdout#info] [OVPN 4] OUT: '2022-04-29 05:21:22 198.51.100.1:16245 [mohit_AUTOLOGIN] Peer Connection Initiated with [AF_INET]192.0.2.1:16245 (via [AF_INET]198.51.100.1%ens160)' | {timestamp}[stdout#{log_level}][OVPN <message_text>]OUT:(<optional_field>'|")<message_text>{message}(<optional_field>'|") message is mapped to <message_text>with[<message_text>]<message_text>:{port}<message_text> |
STATUS UPDATE | timestamp is mapped to metadata.timestamp log_level is mapped to security_result.severity metadata.vendor_name is set to OpenVPN metadata.product_name is set to OpenVPN Access Server principal.platform is set to Linux target_ip is mapped to target.ip target_port is mapped to target.port target_hostname is mapped to target.hostname intermediary_ip is mapped to intermediary.ip |
var/log/openvpnas.log | 2022-04-29T10:51:22+0530 [stdout#info] [OVPN 4] OUT: \"2022-04-29 05:21:22 mohit_AUTOLOGIN/198.51.100.1:16245 SENT CONTROL [mohit_AUTOLOGIN]: 'PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 12,ping-restart 50,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 198.51.100.1,dhcp-option DNS 192.0.2.1,dhcp-option DNS 192.0.2.1,register-dns,block-ipv6,ifconfig 198.51.100.1 203.0.113.1,peer-id 0,auth-tokenSESS_ID,cipher AES-256-GCM,key-derivation tls-ekm' (status=1)\" | {timestamp}[stdout#{log_level}][OVPN <message_text>]OUT:(<optional_field>'|")<message_text>{user}\/{ip}:{message}(<optional_field>'|") | STATUS UPDATE | timestamp is mapped to metadata.timestamp log_level is mapped to security_result.severity message is mapped to metadata.description user is mapped to target.hostname ip is mapped to target.ip port is mapped to taregt.port metadata.vendor_name is set to OpenVPN metadata.product_name is set to OpenVPN Access Server principal.platform is set to Linux |
var/log/openvpnas.log | 2022-04-29T10:51:22+0530 [stdout#info] AUTH SUCCESS {'status': 0, 'user': 'mohit', 'reason': 'AuthAutoLogin: autologin certificate auth succeeded', 'proplist': {'prop_autogenerate': 'true', 'prop_autologin': 'true', 'pvt_password_digest': '[redacted]', 'type': 'user_connect'}, 'common_name': 'mohit_AUTOLOGIN', 'serial': '3', 'serial_list': []} cli='win'/'3.git::d3f8b18b'/'OCWindows_3.3.6-2752' | {timestamp}[stdout#{log_level}]{summary}{'<message_text>':({status})?'<message_text>':({user})?'<message_text>':({reason})?<message_text>}, 'common_name':'{user_name}'<message_text>}cli='{cli}' | STATUS UPDATE | timestamp is mapped to metadata.timestamp log_level is mapped to security_result.severity message is mapped to security_result.description summary is mapped to security_result.summary user_name is mapped to principal.user.user_display_name cli is mapped to principal.process.command_line status is mapped to principal.user.user_authentication_status metadata.vendor_name is set to "OpenVPN" metadata.product_name is set to "OpenVPN Access Server" principal.platform is set to "LINUX" |
/var/log/rundeck/service.log | [2022-05-04T17:03:11,166] WARN config.NavigableMap - Accessing config key '[filterNames]' through dot notation is deprecated, and it will be removed in a future release. Use 'config.getProperty(key, targetClass)' instead. | [{timestamp}]{severity}{summary}\-{security_description}
, at {command_line}\({file_path}:<message_text>\) |
STATUS UPDATE | command_line is mapped to "target.process.command_line"
file_path is mapped to "target.process.file.full_path" timestamp is mapped to "metadata.event_timestamp" severity is mapped to "security_result.severity" summary is mapped to "security_result.summary" security_description is mapped to "security_result.description" metadata.product_name is set to "FLUENTD" metadata.vendor_name is set to "FLUENTD" |
/var/log/auth.log | Jul 4 19:26:19 Ubuntu18 systemd-logind[982]: Removed session 153. | {timestamp} {principal_hostname}{principal_application}(<optional_field>[{pid}]):{security_description}{network_session_id}?(of user{principal_user_userid})? | USER_LOGOUT | timestamp is mapped to "metadata.timestamp" principal_hostname is mapped to target.hostname if value is "USER_LOGOUT" else it is mapped to principal.hostname principal_application is mapped to target.application if value is "USER_LOGOUT" else it is mapped to "principal.application" pid is mapped to target.process.pid if value is "USER_LOGOUT" else it is mapped to principal.process.pid. security_description is mapped to "security_result.description" network_session_id is mapped to "network.session_id" principal_user_userid is mapped to principal.user.userid if value is "USER_LOGOUT" else it is mapped to target.user.userid. "principal.platform" is set to "LINUX" If event security_description is Removed session, then the event_type is set to USER_LOGOUT. extensions.auth.type is set to AUTHTYPE_UNSPECIFIED metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/auth.log | Jun 27 11:07:17 Ubuntu18 systemd-logind[804]: New session 564 of user root. | {timestamp} {principal_hostname}{principal_application}(<optional_field>[{pid}]):{security_description}{network_session_id}?(of user{principal_user_userid})? | USER_LOGIN | timestamp is mapped to "metadata.timestamp" principal_hostname is mapped to target.hostname if value is "USER_LOGOUT" else it is mapped to principal.hostname principal_application is mapped to target.application if value is "USER_LOGOUT" else it is mapped to "principal.application" pid is mapped to target.process.pid if value is "USER_LOGOUT" else it is mapped to principal.process.pid. security_description is mapped to "security_result.description" network_session_id is mapped to "network.session_id" principal_user_userid is mapped to principal.user.userid if value is "USER_LOGOUT" else it is mapped to target.user.userid. "principal.platform" is set to "LINUX" "network.application_protocol" is mapped to "SSH" if(new_session) event_type is set to USER_LOGIN extensions.auth.type is set to AUTHTYPE_UNSPECIFIED metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/auth.log | Jun 27 11:07:17 Ubuntu18 sshd[9349]: Accepted password for root from 198.51.100.1 port 57619 ssh2 | {timestamp} {principal_hostname}{principal_application}(<optional_field>[{pid}])<optional_field> {security_description} for (invalid user )?{principal_user_userid} from {principal_ip} port {principal_port} ssh2(:{security_result_detection_fields_ssh_kv}SHA256:{security_result_detection_fields_kv})? | USER_LOGIN | timestamp is mapped to "metadata.timestamp" principal_hostname is mapped to target.hostname if value is "USER_LOGOUT" else it is mapped to principal.hostname principal_application is mapped to target.application if value is "USER_LOGOUT" else it is mapped to "principal.application" pid is mapped to target.process.pid if value is "USER_LOGOUT" else it is mapped to principal.process.pid. security_description is mapped to "security_result.description" principal_user_userid is mapped to principal.user.userid if value is "USER_LOGOUT" else it is mapped to target.user.userid. principal_ip is mapped to "principal.ip" principal_port is mapped to "principal.port" security_result_detection_fields_ssh_kv is mapped to "security_result.detection_fields.key/value" security_result_detection_fields_kv is mapped to "security_result.detection_fields.key/value" "principal.platform" is set to "LINUX" "network.application_protocol" is set to "SSH" metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/auth.log | Apr 28 11:51:13 Ubuntu18 sudo[24149]: root : TTY=pts/5 ; PWD=/ ; USER=root ; COMMAND=/bin/ls | {timestamp} {principal_hostname}{principal_application}(<optional_field>[{pid}])<optional_field> {principal_user_userid} :( {security_description} ;)? TTY=<message_text> ; PWD={principal_process_command_line_1} ; USER={principal_user_attribute_labels_uid_kv} ; COMMAND={principal_process_command_line_2} | STATUS UPDATE | timestamp is mapped to metadata.timestamp principal_hostname is mapped to principal.hostname principal_application is mapped to principal.application pid is mapped to principal.process.pid principal_user_userid is mapped to target.user.userid security_description is mapped to "security_result.description" principal_process_command_line_1 is mapped to "principal.process.command_line" principal_process_command_line_2 is mapped to "principal.process.command_line" principal_user_attribute_labels_uid_kv is mapped to "principal.user.attribute.labels.key/value" "principal.platform" is set to "LINUX" |
/var/log/auth.log | Jul 4 19:39:01 Ubuntu18 CRON[17217]: pam_unix(cron:session): session opened for user root by (uid=0) | {timestamp} {principal_hostname}{principal_application}(<optional_field>[{pid}])<optional_field> {security_description} for (invalid user|user)?{principal_user_userid}(by (uid={principal_user_attribute_labels_uid_kv}))?$ | USER_LOGIN | timestamp is mapped to metadata.timestamp principal_hostname is mapped to target.hostname if value is "USER_LOGOUT" else it is mapped to principal.hostname principal_application is mapped to target.application if value is "USER_LOGOUT" else it is mapped to "principal.application" pid is mapped to target.process.pid if value is "USER_LOGOUT" else it is mapped to principal.process.pid. security_description is mapped to "security_result.description" principal_user_userid is mapped to principal.user.userid if value is "USER_LOGOUT" else it is mapped to target.user.userid. principal_user_attribute_labels_uid_kv is mapped to "principal.user.attribute.labels.key/value" "principal.platform" is set to "LINUX" "network.application_protocol" is set to "SSH" metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/auth.log | Jul 4 19:24:43 Ubuntu18 sshd[14731]: pam_unix(sshd:session): session closed for user root | {timestamp} {principal_hostname}{principal_application}<optional_filed>[{pid}]): {security_description} for (invalid user|user){principal_user_userid} | USER_LOGOUT | timestamp is mapped to metadata.timestamp principal_hostname is mapped to target.hostname if value is "USER_LOGOUT" else it is mapped to principal.hostname principal_application is mapped to target.application if value is "USER_LOGOUT" else it is mapped to "principal.application" pid is mapped to target.process.pid if value is "USER_LOGOUT" else it is mapped to principal.process.pid. security_description is mapped to "security_result.description" principal_user_userid is mapped to principal.user.userid if value is "USER_LOGOUT" else it is mapped to target.user.userid. principal_user_attribute_labels_uid_kv is mapped to principal.user.attribute.labels.key/value "principal.platform" is set to "LINUX" metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/auth.log | Jun 30 11:32:26 Ubuntu18 sshd[29425]: Connection reset by authenticating user root 198.51.100.1 port 52518 [preauth] | {timestamp} {principal_hostname}{principal_application}(<optional_field>[{pid}]):{security_description}(from|{principal_user_userid}){target_ip}port{target_port}<optional_field>[preauth]|:<text_message>{security_summary}|) | USER_LOGOUT | timestamp is mapped to metadata.timestamp principal_hostname is mapped to target.hostname if value is "USER_LOGOUT" else it is mapped to principal.hostname principal_application is mapped to target.application if value is "USER_LOGOUT" else it is mapped to "principal.application" pid is mapped to target.process.pid if value is "USER_LOGOUT" else it is mapped to principal.process.pid. security_description is mapped to security_result.description security_summary is mapped to security_result.summary principal_user_userid is mapped to principal.user.userid if value is "USER_LOGOUT" else it is mapped to target.user.userid. target_ip is mapped to target.ip target_port is mapped to target.port" principal.platform" is set to "LINUX" metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
var/log/samba/log.winbindd | [2022/05/05 13:51:22.212484, 0] ../source3/winbindd/winbindd_cache.c:3170(initialize_winbindd_cache)initialize_winbindd_cache: clearing cache and re-creating with version number 2 | {timestamp},{severity}(<optional_field>,pid={pid},effective({principal_user_attribute_labels_kv},{principal_group_attribute_labels_kv}),real({principal_user_userid},{principal_group_product_object_id}))?]<message_text>:{security_description} | STATUS UPDATE | timestamp is mapped to "metadata.timestamp" pid is mapped to "principal.process.pid" principal_user_attribute_labels_kv is mapped to "principal.user.attribute.labels" principal_group_attribute_labels_kv is mapped to "principal.group.attribute.labels" principal_user_userid is mapped to "principal.user.userid" principal_group_product_object_id is mapped to "principal.group.product_object_id" security_description is mapped to "security_result.description" metadata_description is mapped to "metadata.description" metadata.product_name" is set to "FLUENTD" metadata.vendor_name" is set to "FLUENTD" |
var/log/samba/log.winbindd | messaging_dgm_init: bind failed: No space left on device | {user_id}: {desc} | STATUS UPDATE | metadata.product_name" is set to "FLUENTD" metadata.vendor_name" is set to "FLUENTD" user_id is mapped to principal.user.userid desc is mapped to metadata.description |
/var/log/mail.log | July 16 11:40:56 Ubuntu18 sendmail[9341]: 22G6AtwH009341: from=<fluentd@Ubuntu18>, size=377, class=0, nrcpts=1, metadata_descriptionid=<202203160610.22G6AtwH009341@Ubuntu18.cdsys.local>, proto=SMTP, daemon=MTA-v4, relay=localhost [192.0.2.1] | {timestamp} {target_hostname} {application}[{pid}]: <message_text>:{KV} | STATUS UPDATE | target_hostname is mapped to target.hostname application is mapped to target.application pid is mapped to target.process.pid metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/mail.log | July 7 13:44:01 prod postfix/pickup[22580]: AE4271627DB: uid=0 from=<root> | {timestamp} {target_hostname} {application}[{pid}]: <message_text>{KV} | EMAIL_UNCATEGORIZED | target_hostname is mapped to target.hostname application is mapped to target.application pid is mapped to target.process.pid metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/mail.log | July 7 13:44:01 prod postfix/cleanup[23434]: AE4271627DB: message-id=<20150207184401.AE4271627DB@server.hostname.01> | {timestamp} {target_hostname} {application}[{pid}]: <message_text> message-id=<{resource_name}> | STATUS UPDATE | target_hostname is mapped to target.hostname application is mapped to target.application pid is mapped to target.process.pid resource_name is mapped to target.resource.name metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/mail.log | July 7 13:44:01 prod postfix/qmgr[3539]: AE4271627DB: from=<root@server.hostname.01>, size=565, nrcpt=1 (queue active) | {timestamp} {target_hostname} {application}[{pid}]: <message_text>{KV} | EMAIL_UNCATEGORIZED | target_hostname is mapped to target.hostname application is mapped to target.application pid is mapped to target.process.pid metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/mail.log | July 7 13:44:01 prod postfix/smtp[23436]: connect to gmail-smtp-in.l.example.com[2607:xxxx:xxxx:xxx::xx]:25: Network is unreachable | {timestamp} {target_hostname} {application}[{pid}]: <message_text>{KV} | STATUS UPDATE | target_hostname is mapped to target.hostname application is mapped to target.application pid is mapped to target.process.pid metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
/var/log/mail.log | July 7 13:44:02 prod postfix/local[23439]: E62521627DC: to=<root@server.hostname.01>, relay=local, delay=0.01, delays=0/0.01/0/0, dsn=2.0.0, status=sent (delivered to mailbox) | {timestamp} {target_hostname} {application}[{pid}]: <message_text>{KV} | EMAIL_UNCATEGORIZED | target_hostname is mapped to target.hostname application is mapped to target.application pid is mapped to target.process.pid metadata.vendor_name is set to "FLUENTD" metadata.product_name is set to "FLUENTD" |
Audit
Audit log fields to UDM fields
The following table lists the log fields of the audit log type and their corresponding UDM fields.
Log field | UDM field |
---|---|
acct | target.user.user_display_name |
addr | principal.ip |
arch | about.labels.key/value |
auid | target.user.userid |
cgroup | principal.process.file.full_path |
cmd | target.process.command_line |
comm | target.application |
cwd | target.file.full_path |
data | about.labels.key/value |
devmajor | about.labels.key/value |
devminor | about.labels.key/value |
egid | target.group.product_object_id |
euid | target.user.userid |
exe | target.process.file.full_path |
exit | target.labels.key/value |
family | network.ip_protocol is set to "IP6IN4" if "ip_protocol" == 2 else it is set to "UNKNOWN_IP_PROTOCOL" |
filetype | target.file.mime_type |
fsgid | target.group.product_object_id |
fsuid | target.user.userid |
gid | target.group.product_object_id |
hostname | target.hostname |
icmptype | network.ip_protocol is set to "ICMP" |
id | If [audit_log_type] == "ADD_USER", target.user.userid is set to "%{id}"
If [audit_log_type] == "ADD_GROUP", target.group.product_object_id is set to "%{id}" else target.user.attribute.labels.key/value is set to id |
inode | target.resource.product_object_id |
key | security_result.detection_fields.key/value |
list | security_result.about.labels.key/value |
mode | target.resource.attribute.permissions.name
target.resource.attribute.permissions.type |
name | target.file.full_path |
new-disk | target.resource.name |
new-mem | target.resource.attribute.labels.key/value |
new-vcpu | target.resource.attribute.labels.key/value |
new-net | pincipal.mac |
new_gid | target.group.product_object_id |
oauid | target.user.userid |
ocomm | target.process.command_line |
opid | target.process.pid |
oses | network.session_id |
ouid | target.user.userid |
obj_gid | target.group.product_object_id |
obj_role | target.user.attribute.role.name |
obj_uid | target.user.userid |
obj_user | target.user.user_display_name |
ogid | target.group.product_object_id |
ouid | target.user.userid |
path | target.file.full_path |
perm | target.asset.attribute.permissions.name |
pid | target.process.pid |
ppid | target.parent_process.pid |
proto | If [ip_protocol] == 2, network.ip_protocol is set to "IP6IN4"
else network.ip_protocol is set to "UNKNOWN_IP_PROTOCOL" |
res | security_result.summary |
result | security_result.summary |
saddr | security_result.detection_fields.key/value |
sauid | target.user.attribute.labels.key/value |
ses | network.session_id |
sgid | target.group.product_object_id |
sig | security_result.detection_fields.key/value |
subj_user | target.user.user_display_name |
success | If success=='yes', security_result.summary is set to 'system call was successful' else security_result.summary is set to 'systemcall was failed' |
suid | target.user.userid |
syscall | about.labels.key/value |
terminal | target.labels.key/value |
tty | target.labels.key/value |
uid | If [audit_log_type] in [SYSCALL, SERVICE_START, ADD_GROUP, ADD_USER, MAC_IPSEC_EVENT, MAC_UNLBL_STCADD, OBJ_PID, CONFIG_CHANGE, SECCOMP, USER_CHAUTHTOK, USYS_CONFIG, DEL_GROUP, DEL_USER, USER_CMD, USER_MAC_POLICY_LOAD] uid is set to principal.user.userid
else uid is set to target.user.userid |
vm | target.resource.name |
Audit log types to UDM event type
The following table lists the audit log types and their corresponding UDM event types.
Audit log type | UDM event type | Description |
---|---|---|
ADD_GROUP | GROUP_CREATION | Triggered when a user-space group is added. |
ADD_USER | USER_CREATION | Triggered when a user-space user account is added. |
ANOM_ABEND | GENERIC_EVENT / PROCESS_TERMINATION | Triggered when a processes ends abnormally (with a signal that could cause a core dump, if enabled). |
AVC | GENERIC_EVENT | Triggered to record an SELinux permission check. |
CONFIG_CHANGE | USER_RESOURCE_UPDATE_CONTENT | Triggered when the Audit system configuration is modified. |
CRED_ACQ | USER_LOGIN | Triggered when a user acquires user-space credentials. |
CRED_DISP | USER_LOGOUT | Triggered when a user disposes of user-space credentials. |
CRED_REFR | USER_LOGIN | Triggered when a user refreshes their user-space credentials. |
CRYPTO_KEY_USER | USER_RESOURCE_ACCESS | Triggered to record the cryptographic key identifier used for cryptographic purposes. |
CRYPTO_SESSION | PROCESS_TERMINATION | Triggered to record parameters set during a TLS session establishment. |
CWD | SYSTEM_AUDIT_LOG_UNCATEGORIZED | Triggered to record the current working directory. |
DAEMON_ABORT | PROCESS_TERMINATION | Triggered when a daemon is stopped due to an error. |
DAEMON_END | PROCESS_TERMINATION | Triggered when a daemon is successfully stopped. |
DAEMON_RESUME | PROCESS_UNCATEGORIZED | Triggered when the auditd daemon resumes logging. |
DAEMON_ROTATE | PROCESS_UNCATEGORIZED | Triggered when the auditd daemon rotates the Audit log files. |
DAEMON_START | PROCESS_LAUNCH | Triggered when the auditd daemon is started. |
DEL_GROUP | GROUP_DELETION | Triggered when a user-space group is deleted |
Pending | USER_DELETION | Triggered when a user-space user is deleted |
EXECVE | PROCESS_LAUNCH | Triggered to record arguments of the execve(2) system call. |
MAC_CONFIG_CHANGE | GENERIC_EVENT | Triggered when an SELinux Boolean value is changed. |
MAC_IPSEC_EVENT | SYSTEM_AUDIT_LOG_UNCATEGORIZED | Triggered to record information about an IPSec event, when one is detected, or when the IPSec configuration changes. |
MAC_POLICY_LOAD | GENERIC_EVENT | Triggered when a SELinux policy file is loaded. |
MAC_STATUS | GENERIC_EVENT | Triggered when the SELinux mode (enforcing, permissive, off) is changed. |
MAC_UNLBL_STCADD | SYSTEM_AUDIT_LOG_UNCATEGORIZED | Triggered when a static label is added when using the packet labeling capabilities of the kernel provided by NetLabel. |
NETFILTER_CFG | GENERIC_EVENT | Triggered when Netfilter chain modifications are detected. |
OBJ_PID | SYSTEM_AUDIT_LOG_UNCATEGORIZED | Triggered to record information about a process to which a signal is sent. |
PATH | FILE_OPEN/GENERIC_EVENT | Triggered to record file name path information. |
SELINUX_ERR | GENERIC_EVENT | Triggered when an internal SELinux error is detected. |
SERVICE_START | SERVICE_START | Triggered when a service is started. |
SERVICE_STOP | SERVICE_STOP | Triggered when a service is stopped. |
SYSCALL | GENERIC_EVENT | Triggered to record a system call to the kernel. |
SYSTEM_BOOT | STATUS_STARTUP | Triggered when the system is booted up. |
SYSTEM_RUNLEVEL | STATUS_UPDATE | Triggered when the system's run level is changed. |
SYSTEM_SHUTDOWN | STATUS_SHUTDOWN | Triggered when the system is shut down. |
USER_ACCT | SETTING_MODIFICATION | Triggered when a user-space user account is modified. |
USER_AUTH | USER_LOGIN | Triggered when a user-space authentication attempt is detected. |
USER_AVC | USER_UNCATEGORIZED | Triggered when a user-space AVC message is generated. |
USER_CHAUTHTOK | USER_RESOURCE_UPDATE_CONTENT | Triggered when a user account attribute is modified. |
USER_CMD | USER_COMMUNICATION | Triggered when a user-space shell command is executed. |
USER_END | USER_LOGOUT | Triggered when a user-space session is terminated. |
USER_ERR | USER_UNCATEGORIZED | Triggered when a user account state error is detected. |
USER_LOGIN | USER_LOGIN | Triggered when a user logs in. |
USER_LOGOUT | USER_LOGOUT | Triggered when a user logs out. |
USER_MAC_POLICY_LOAD | RESOURCE_READ | Triggered when a user-space daemon loads an SELinux policy. |
USER_MGMT | USER_UNCATEGORIZED | Triggered to record user-space management data. |
USER_ROLE_CHANGE | USER_CHANGE_PERMISSIONS | Triggered when a user's SELinux role is changed. |
USER_START | USER_LOGIN | Triggered when a user-space session is started. |
USYS_CONFIG | USER_RESOURCE_UPDATE_CONTENT | Triggered when a user-space system configuration change is detected. |
VIRT_CONTROL | STATUS_UPDATE | Triggered when a virtual machine is started, paused, or stopped. |
VIRT_MACHINE_ID | USER_RESOURCE_ACCESS | Triggered to record the binding of a label to a virtual machine. |
VIRT_RESOURCE | USER_RESOURCE_ACCESS | Triggered to record resource assignment of a virtual machine. |
Mail log fields to UDM fields
The following table lists the log fields of the mail log type and their corresponding UDM fields.
Log field | UDM field |
---|---|
Class | about.labels.key/value |
Ctladdr | principal.user.user_display_name |
From | network.email.from |
Msgid | network.email.mail_id |
Proto | network.application_protocol |
Relay | intermediary.hostname
intermediary.ip |
Size | network.received_bytes |
Stat | security_result.summary |
to | network.email.to |
Mail log types to UDM event type
The following table lists the mail log types and their corresponding UDM event types.
Mail log type | UDM event type |
---|---|
sendmail | STATUS UPDATE |
pickup | EMAIL_UNCATEGORIZED |
cleanup | STATUS UPDATE |
qmgr | EMAIL_UNCATEGORIZED |
smtp | STATUS UPDATE |
local | EMAIL_UNCATEGORIZED |