-
Notifications
You must be signed in to change notification settings - Fork 74
Standard Event Schema
Osmany Montero edited this page Jan 19, 2026
·
4 revisions
To ensure consistency and allow rules to work across different data sources, the EventProcessor uses a standardized event schema. All filters should aim to map extracted data to these standard fields.
The core event object consists of several top-level metadata fields and three main namespaces: log, origin, and target.
Metadata fields that describe the event itself.
| Field | Description |
|---|---|
id |
Unique identifier for the event (UUID). |
@timestamp |
The time the event was processed in ISO8601 format. |
deviceTime |
The original timestamp from the source device. |
dataType |
The category of the log (e.g., syslog, wineventlog, linux, firewall-fortigate-traffic). |
dataSource |
The specific source or integration name (e.g., o365-tenant-01). |
tenantId |
Unique ID of the organization the event belongs to. |
action |
The activity performed (e.g., login, file_create, connection). |
actionResult |
The outcome of the action (success, failure, denied). |
protocol |
Network protocol used (e.g., tcp, udp, http). |
statusCode |
Numerical status if applicable (e.g., HTTP 404). |
severity |
Event importance (debug, info, warning, error, critical). |
The log namespace is a dictionary used for storing any field that does not fit into the standard categories below.
-
Usage:
log.my_custom_field,log.parsing_status.
Used to describe the "Who" and "Whom" of an event. Both namespaces support the same set of attributes.
| Field | Description |
|---|---|
ip |
IPv4 or IPv6 address. |
host |
Hostname of the system. |
domain |
Domain name or FQDN. |
port |
Network port (integer). |
mac |
MAC address. |
url |
Full URL if applicable. |
| Field | Description |
|---|---|
user |
Username or account identifier. |
group |
Security group or role. |
email |
Email address associated with the side. |
| Field | Description |
|---|---|
process |
Name of the executable. |
command |
Full command line executed. |
file |
Base filename. |
path |
Full directory path to the file. |
hash |
Generic hash (usually SHA256). |
md5 / sha256
|
Specific cryptographic hashes. |
| Field | Description |
|---|---|
country |
Country name. |
countryCode |
Two-letter ISO country code. |
city |
City name. |
asn |
Autonomous System Number. |
aso |
Autonomous System Organization. |
-
Always Map IPs: If your log contains IP addresses, map them to
origin.ipandtarget.ip. This is critical for correlation and geolocation plugins. -
Normalize Actions: Use a consistent set of actions (e.g.,
logininstead oflogonorsignin) to make rules more effective across different log types. -
Use the Raw Field: Keep the original log in the
rawfield during the first steps of parsing, thendeleteit at the end of the pipeline to save storage space. -
Case Sensitivity: By default, field names are case-sensitive. It is recommended to use camelCase for custom
logfields.