Skip to main content

Product Field Mappings

AWS CloudTrail

AWS CloudTrail is a service that records actions taken by users, roles, or AWS services, capturing events from the AWS Management Console, AWS CLI, SDKs, and APIs. AlphaSOC processes AWS CloudTrail logs to identify potential threats based on these actions.

Learn how to enable AWS CloudTrail logging here.

note

Additional AWS CloudTrail log fields can be found in the raw event.

Query log examples

To see query log examples, visit the AWS CloudTrail documentation.

Log field mappings

Data type: Audit: AWS CloudTrail

Data origin: aws-cloudtrail

AlphaSOC fieldLog fieldNotes
tseventTime
srcIDrecipientAccountIdaws/{recipientAccountId}
dataScoperecipientAccountId
awsRegion
recipientAccountId and awsRegion are mapped into the string format aws:{recipientAccountId}:{awsRegion}:

AWS Route 53

AWS Route 53 is a scalable DNS web service by Amazon that translates domain names into IP addresses. AlphaSOC processes AWS Route 53 logs to help you identify potential threats related to DNS activity.

Learn how to enable AWS Route 53 logging here.

Query log examples

To see query log examples, visit the AWS Route 53 documentation.

Log field mappings

Data type: DNS

Data origin: aws-route53

AlphaSOC fieldLog fieldNotes
tsquery_timestamp
srcIPsrcaddr
srcPortsrcport
fqdnquery_name
qtypequery_type
rcodercode
srcIDsrcids.instance
srcHostsrcids.instance
dataScope account_id
region
vpc_id
account_id, region, and vpc_id are mapped into the string format aws:{account_id}:{region}:{vpc_id}
labels account_id
region
A key-value pair where aws/accountId is assigned the value of account_id, and aws/region is assigned the value of region

AWS VPC Flow

AWS Virtual Private Cloud (VPC) is a data collection feature that logs IP network traffic flow from the VPC, VPC subnet, or Elastic Network Interface (ENI). AlphaSOC processes AWS VPC Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable AWS VPC Flow logging here.

Query log examples

To see query log examples, visit the VPC Flow log records.

Log field mappings

Data type: IP

Data origin: aws-vpc-flow

AlphaSOC fieldLog fieldNotes
tsstart
durationThis field is based on the difference between the end and start timestamps
srcIPpkt-srcaddr
srcaddr
pkt-srcaddr takes priority over srcaddr
destIPpkt-dstaddr
dstaddr
pkt-dstaddr takes priority over dstaddr
srcPortsrcport
destPortdstport
protoprotocol
packetsOutpackets
srcHostinstance-id
srcIDinstance-id
actionaction
bytesOutbytes
dataScopeaccount-id
region
account_id and region are mapped into the string format aws:{account_id}:{region}

Azure Device Network

Azure Device Network is a data format used by Microsoft Defender to collect and store metadata about device network activity. AlphaSOC processes Azure Device Network logs to help analyze IP network and DNS traffic and identify potential threats.

Query log examples

To see query log fields, visit the Device Network documentation.

Log field mappings

Data type: IP, DNS

Data origin: azure-device-network

AlphaSOC fieldLog field
tstimestamp
srcIPlocalIP
srcPortlocalPort
srcHostDeviceName
srcIDDeviceId
srcUserInitiatingProcessAccountUpn
fqdnRemoteUrl
destIPRemoteIP
destPortRemotePort
protoProtocol

Azure NSG Flow

Azure Network Security Group (NSG) Flow is a data collection feature that captures and logs metadata about network traffic processed by Network Security Groups (NSGs). AlphaSOC processes Azure NSG Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable Azure NSG Flow logging here.

Query log examples

To see query log examples, visit the NSG Flow query results.

Log field mappings

Data type: IP

Data origin: azure-nsg-flow

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIPsourceIP
destIPdestinationIP
srcPortsourcePort
destPortdestinationPort
protoprotocol
actiontrafficDecision
packetsOutpacketsSent
bytesOutbytesSent
packetsInpacketsReceived
bytesInbytesReceived
srcMacmac
macAddress
mac takes priority over macAddress
labelsresourceId

Azure VNet Flow

Azure Virtual Network (VNet) Flow is a data collection feature that captures and logs metadata about network traffic flowing through Network Security Groups (NSGs). AlphaSOC processes Azure VNet Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable Azure VNet Flow logging here.

Query log examples

To see query log examples, visit the VNet Flow query results.

Log field mappings

Data type: IP

Data origin: azure-vnet-flow

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIPsourceIP
destIPdestinationIP
srcPortsourcePort
destPortdestinationPort
protoprotocol
packetsOutpacketsSent
bytesOutbytesSent
packetsInpacketsReceived
bytesInbytesReceived
srcMacmac
macAddress
mac takes priority over macAddress
labelsflowLogResourceID

Carbon Black Netconn

Carbon Black Netconn is a feature within Carbon Black Endpoint Detection and Response (EDR), providing detailed information about network connections on endpoints. AlphaSOC processes Carbon Black Netconn data to help you analyze IP network traffic and identify potential threats.

Learn how to enable Carbon Black Netconn logging here.

Query log examples

To see query log examples, visit the Netconn log records.

Log field mappings

Data type: IP

Data origin: carbonblack-netconn

AlphaSOC fieldLog fieldNotes
tstimestamp
srcHostcomputer_name
directionThis field is used to filter and process outbound traffic
fqdndomain
eventTypeevent_type
ja3ja3
ja3sja3s
srcIPlocal_ip
srcPortlocal_port
protoprotocol
destIPremote_ip
destPortremote_port

Confluence

Confluence is a collaboration knowledge management platform that allows teams to create, organize, and share information. AlphaSOC analyzes Confluence audit logs to help you monitor user activity and detect potential threats across your organization’s workspaces.

Learn how to enable Confluence logging here.

note

Additional Confluence log fields can be found in the raw event.

Log field mappings

Data type: Audit: Confluence

Data origin: confluence-audit

AlphaSOC fieldLog fieldNotes
tscreationDateAll creationDate fields are standardized to UTC timezone.
srcIDauthor.accountId
srcUserauthor.displayName

Crowdstrike FDR

Crowdstrike Falcon Data Replicator (FDR) is a data collection and replication feature that captures and logs metadata about network traffic collected by Crowdstrike Falcon. AlphaSOC processes Crowdstrike FDR logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable Crowdstrike FDR logging here.

Query log examples

To see query log examples, visit the Crowdstrike FDR documentation.

Log field mappings

Data type: IP, DNS

Data origin: crowdstrike-data

AlphaSOC fieldLog fieldNotes
tstimestamp
LogonTime
LogoffTime
Please refer to the note below
srcIDaid
srcHostClientComputerName
srcUserUserName
fqdnDomainName
qtypeRequestType
rcodeQueryStatus
srcIPLocalAddressIP4
LocalAddressIP6
LocalAddressIP4 takes priority over LocalAddressIP6
srcPortLocalPort
destIPRemoteAddressIP4
RemoteAddressIP6
RemoteAddressIP4 takes priority over RemoteAddressIP6
destPortRemotePort
protoProtocol

Log field names are determined by the EventName value:

  • DnsRequest, NetworkConnectIP4, and NetworkConnectIP6 events use timestamp.
  • UserLogon events use LogonTime.
  • UserLogoff events use LogoffTime.

Data origin: crowdstrike-aid-master

AlphaSOC fieldLog fieldNotes
tsTime
srcIDaid
srcHostComputerName

DNSTap

DNSTap is a data collection feature that captures and logs metadata about DNS traffic. AlphaSOC processes DNSTap logs to help you analyze DNS traffic and identify potential threats.

Learn how to enable DNSTap logging in CoreDNS.

Query log examples

The queries conform to the standard DNS format.

Log field mappings

Data type: DNS

Data origin: dnstap

AlphaSOC fieldLog fieldNotes
tsquery_time_sec
query_time_nsec
Timestamp values, represented as separate seconds (query_time_sec) and nanoseconds (query_time_nsec), are combined and converted into a UTC
srcIPquery_address
srcPortquery_port
fqdnquery_name
qtypequery_type
rcodequery_rcode

The log fields names are derived directly from the Protocol Buffers definitions.

GCP Cloud DNS

GCP Cloud Domain Name System (DNS) is a service that captures and logs data related to DNS queries and responses. AlphaSOC processes GCP Cloud DNS logs to help you analyze DNS queries and responses and identify potential threats.

Learn how to enable GCP Cloud DNS logging here.

Query log examples

To see query log fields, visit the Cloud DNS query results.

Log field mappings

Data type: DNS

Data origin: gcp-dns

AlphaSOC fieldLog fieldNotes
tstimestamp
qtypequeryType
fqdnqueryName
srcIDvmInstanceName
vmInstanceIdString
VMInstanceIDString takes priority over vmInstanceName
rcoderesponseCode
srcIPsourceIP

GCP VPC Flow

GCP Virtual Private Cloud (VPC) is a data collection feature that captures and logs metadata about network traffic flowing to and from virtual machine instances within a GCP VPC. AlphaSOC processes GCP VPC Flow logs to help you analyze IP network traffic and identify potential threats.

Learn how to enable GCP VPC Flow logging here.

Query log examples

To see query log examples, visit the VPC Flow query results.

Log field mappings

Data type: IP

Data origin: gcp-vpc-flow

AlphaSOC fieldLog fieldNotes
bytesOutbytes_sent
packetsOutpackets_sent
destIPdest_ip
destPortdest_port
protoprotocol
srcIPsrc_ip
srcPortsrc_portThis field is used to filter and process outbound traffic from the VM to the internet
tsstart_time
durationThis field is based on the difference between the end and start timestamps
srcHostvm_name
project_id
Both values are used to determine the srcHost

GitHub

GitHub is a web-based platform for version control and collaboration. AlphaSOC processes GitHub audit logs to identify potential threats in GitHub Enterprise environments.

Learn how to enable GitHub logging here.

note

Additional GitHub log fields can be found in the raw event.

Log field mappings

Data type: Audit: GitHub

Data origin: github-audit

AlphaSOC fieldLog fieldNotes
ts@timestamp
srcIDactor_id
srcUseractor
dataScopeorgGitHub log field is mapped into the following format: github:org

Jira

Jira is a project management and issue tracking tool. AlphaSOC processes Jira audit logs to help you analyze user activity and identify potential threats across your organization's collaborative workspaces.

Learn how to enable Jira logging here.

note

Additional Jira log fields can be found in the raw event.

Log field mappings

Data type: Audit: Jira

Data origin: jira-audit

AlphaSOC fieldLog field
tscreated
srcIDauthorAccountId

Kubernetes

Kubernetes is an open-source platform for managing containerized applications and automating deployment. AlphaSOC supports multiple Kubernetes providers, with log field mappings that may vary depending on your chosen provider.

note

Additional Kubernetes log fields can be found in the raw event.

AWS EKS

AWS Elastic Kubernetes Service (EKS) is a managed Kubernetes service that simplifies the deployment and management of Kubernetes clusters. AlphaSOC processes AWS EKS audit logs to help you analyze them and identify potential threats.

Learn how to enable AWS EKS logging here.

Log field mappings

Data type: Audit: Kubernetes

Data origin: kube-audit

AlphaSOC fieldLog field
tsrequestReceivedTimestamp
srcIDuser.username

GCP GKE

GCP Google Kubernetes Engine (GKE) enables audit logging capabilities, with the audit logs being captured and stored by Cloud Audit Logs. AlphaSOC processes GCP GKE audit logs to help you analyze them and identify potential threats.

Learn how to enable GCP GKE logging here.

Query log examples

To see query log examples, visit the GKE query results.

Log field mappings

Data type: Audit: Kubernetes

Data origin: gcp-kube-audit

AlphaSOC fieldLog fieldNotes
tstimestamp
srcIDprotoPayload.authenticationInfo.principalEmail
dataScoperesource.labels.cluster_name
resource.labels.location
resource.labels.project_id
GCP GKE log fields are mapped into the following format:gcp:{resource.labels.project_id}:{resource.labels.location}:{resource.labels.cluster_name}

Other Kubernetes providers

Log field mappings

Data type: Audit: Kubernetes

Data origin: kube-audit

AlphaSOC fieldLog field
tsrequestReceivedTimestamp
srcIDuser.username

Microsoft Entra ID

Microsoft Entra ID (formerly Azure Active Directory) is a cloud-based identity and access management service. AlphaSOC processes Microsoft Entra ID audit logs to help you monitor user activity and identify potential threats within your organization.

Learn how to enable Microsoft Entra ID logging here.

note

Additional Microsoft Entra ID log fields can be found in the raw event.

Log field mappings

Data type: Audit: Microsoft Entra ID

Data origin: microsoft-entra-audit

AlphaSOC fieldLog field
tsactivityDateTime
srcIDinitiatedBy.user.userPrincipalName
srcUserinitiatedBy.user.displayName

Okta

Okta is a cloud-based identity and access management (IAM) platform that provides authentication, authorization, and user management services. AlphaSOC processes Okta System Logs to identify potential threats within your organization.

Learn how to enable Okta logging here.

note

Additional Okta log fields can be found in the raw event.

Log field mappings

Data type: Audit: Okta

Data origin: okta-audit

AlphaSOC fieldLog field
tspublished
srcIDactor.id
srcUseractor.displayName

Slack

Slack is a team communication platform. AlphaSOC processes Slack audit logs to identify potential threats within Slack workspaces.

Learn how to enable Slack logging here.

note

Additional Slack log fields can be found in the raw event.

Query log examples

To see query log examples, visit the Slack API documentation.

Log field mappings

Data type: Audit: Slack

Data origin: slack-audit

AlphaSOC fieldLog fieldNotes
tsdate_create
srcIDactor.user.id
srcUseractor.user.name
dataScopecontext.location.idSlack log field is mapped into the following format: slack:context.location.id

Zeek

Zeek is an open-source network traffic analyzer. AlphaSOC processes Zeek logs for IP, DNS, HTTP, TLS, and DHCP activity to help identify potential threats.

Learn how to enable Zeek logging here.

Query log examples

To see query log examples, visit the Zeek documentation.

Log field mappings

Data type: IP

Data origin: zeek-conn

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connIDuid
srcIPid.orig_h
srcPortid.orig_p
destIPid.resp_h
destPortid.resp_p
protoproto
bytesInorig_ip_bytes
bytesOutresp_ip_bytes
packetsInorig_pkts
packetsOutresp_pkts
appservice
durationduration
connStateconn_stateNew, open, closed, or unknown
connDirectionlocal_origThis field applies only to outbound connections

Data type: DHCP

Data origin: zeek-dhcp

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
srcIPclient_addr
srcMacmac
srcHosthost_name
durationlease_time
typeType of lease

Data type: DNS

Data origin: zeek-dns

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connIDuid
srcIPid.orig_h
srcPortid.orig_p
fqdnquery
qtypeqtype_name
rcodercode_name

Data type: HTTP

Data origin: zeek-http

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connIDuid
srcIPid.orig_h
srcPortid.orig_p
urlid.resp_p
host
uri
urlis constructed using id.resp_p, host, and uri. The host field is a required parameter for this field to be constructed
methodmethod
statusstatus_code
bytesInrequest_body_len
bytesOutresponse_body_len
contentTyperesp_mime_typesThe first occurring mime type
referrerreferrer
userAgentuser_agent

Data type: TLS

Data origin: zeek-ssl

AlphaSOC fieldLog fieldNotes
tsts
timestamp
ts takes priority over timestamp
connIDuid
srcIPid.orig_h
srcPortid.orig_p
destIPid.resp_h
destPortid.resp_p
ja3ja3
ja3sja3s
certHashcert_hash
issuerissuer
certificate_issuer
issuer takes priority over certificate_issuer
subjectsubject
certificate_subject
subject takes priority over certificate_subject