Loading

Auditd fields

These are the fields generated by the auditd module.

user.auid
type: alias

alias to: user.audit.id

user.uid
type: alias

alias to: user.id

user.fsuid
type: alias

alias to: user.filesystem.id

user.suid
type: alias

alias to: user.saved.id

user.gid
type: alias

alias to: user.group.id

user.sgid
type: alias

alias to: user.saved.group.id

user.fsgid
type: alias

alias to: user.filesystem.group.id

If resolve_ids is set to true in the configuration then name_map will contain a mapping of uid field names to the resolved name (e.g. auid → root).

user.name_map.auid
type: alias

alias to: user.audit.name

user.name_map.uid
type: alias

alias to: user.name

user.name_map.fsuid
type: alias

alias to: user.filesystem.name

user.name_map.suid
type: alias

alias to: user.saved.name

user.name_map.gid
type: alias

alias to: user.group.name

user.name_map.sgid
type: alias

alias to: user.saved.group.name

user.name_map.fsgid
type: alias

alias to: user.filesystem.group.name

The SELinux identity of the actor.

user.selinux.user
account submitted for authentication

type: keyword

user.selinux.role
user’s SELinux role

type: keyword

user.selinux.domain
The actor’s SELinux domain or type.

type: keyword

user.selinux.level
The actor’s SELinux level.

type: keyword

example: s0

user.selinux.category
The actor’s SELinux category or compartments.

type: keyword

Process attributes.

process.cwd
The current working directory.

type: alias

alias to: process.working_directory

Source that triggered the event.

source.path
This is the path associated with a unix socket.

type: keyword

Destination address that triggered the event.

destination.path
This is the path associated with a unix socket.

type: keyword

auditd.message_type
The audit message type (e.g. syscall or apparmor_denied).

type: keyword

example: syscall

auditd.sequence
The sequence number of the event as assigned by the kernel. Sequence numbers are stored as a uint32 in the kernel and can rollover.

type: long

auditd.session
The session ID assigned to a login. All events related to a login session will have the same value.

type: keyword

auditd.result
The result of the audited operation (success/fail).

type: keyword

example: success or fail

The actor is the user that triggered the audit event.

auditd.summary.actor.primary
The primary identity of the actor. This is the actor’s original login ID. It will not change even if the user changes to another account.

type: keyword

auditd.summary.actor.secondary
The secondary identity of the actor. This is typically the same as the primary, except for when the user has used su.

type: keyword

This is the thing or object being acted upon in the event.

auditd.summary.object.type
A description of the what the "thing" is (e.g. file, socket, user-session).

type: keyword

auditd.summary.object.primary
type: keyword
auditd.summary.object.secondary
type: keyword
auditd.summary.how
This describes how the action was performed. Usually this is the exe or command that was being executed that triggered the event.

type: keyword

List of paths associated with the event.

auditd.paths.inode
inode number

type: keyword

auditd.paths.dev
device name as found in /dev

type: keyword

auditd.paths.obj_user
type: keyword
auditd.paths.obj_role
type: keyword
auditd.paths.obj_domain
type: keyword
auditd.paths.obj_level
type: keyword
auditd.paths.objtype
type: keyword
auditd.paths.ouid
file owner user ID

type: keyword

auditd.paths.rdev
the device identifier (special files only)

type: keyword

auditd.paths.nametype
kind of file operation being referenced

type: keyword

auditd.paths.ogid
file owner group ID

type: keyword

auditd.paths.item
which item is being recorded

type: keyword

auditd.paths.mode
mode flags on a file

type: keyword

auditd.paths.name
file name in avcs

type: keyword

The data from the audit messages.

auditd.data.action
netfilter packet disposition

type: keyword

auditd.data.minor
device minor number

type: keyword

auditd.data.acct
a user’s account name

type: keyword

auditd.data.addr
the remote address that the user is connecting from

type: keyword

auditd.data.cipher
name of crypto cipher selected

type: keyword

auditd.data.id
during account changes

type: keyword

auditd.data.entries
number of entries in the netfilter table

type: keyword

auditd.data.kind
server or client in crypto operation

type: keyword

auditd.data.ksize
key size for crypto operation

type: keyword

auditd.data.spid
sent process ID

type: keyword

auditd.data.arch
the elf architecture flags

type: keyword

auditd.data.argc
the number of arguments to an execve syscall

type: keyword

auditd.data.major
device major number

type: keyword

auditd.data.unit
systemd unit

type: keyword

auditd.data.table
netfilter table name

type: keyword

auditd.data.terminal
terminal name the user is running programs on

type: keyword

auditd.data.grantors
pam modules approving the action

type: keyword

auditd.data.direction
direction of crypto operation

type: keyword

auditd.data.op
the operation being performed that is audited

type: keyword

auditd.data.tty
tty udevice the user is running programs on

type: keyword

auditd.data.syscall
syscall number in effect when the event occurred

type: keyword

auditd.data.data
TTY text

type: keyword

auditd.data.family
netfilter protocol

type: keyword

auditd.data.mac
crypto MAC algorithm selected

type: keyword

auditd.data.pfs
perfect forward secrecy method

type: keyword

auditd.data.items
the number of path records in the event

type: keyword

auditd.data.a0
type: keyword
auditd.data.a1
type: keyword
auditd.data.a2
type: keyword
auditd.data.a3
type: keyword
auditd.data.hostname
the hostname that the user is connecting from

type: keyword

auditd.data.lport
local network port

type: keyword

auditd.data.rport
remote port number

type: keyword

auditd.data.exit
syscall exit code

type: keyword

auditd.data.fp
crypto key finger print

type: keyword

auditd.data.laddr
local network address

type: keyword

auditd.data.sport
local port number

type: keyword

auditd.data.capability
posix capabilities

type: keyword

auditd.data.nargs
the number of arguments to a socket call

type: keyword

auditd.data.new-enabled
new TTY audit enabled setting

type: keyword

auditd.data.audit_backlog_limit
audit system’s backlog queue size

type: keyword

auditd.data.dir
directory name

type: keyword

auditd.data.cap_pe
process effective capability map

type: keyword

auditd.data.model
security model being used for virt

type: keyword

auditd.data.new_pp
new process permitted capability map

type: keyword

auditd.data.old-enabled
present TTY audit enabled setting

type: keyword

auditd.data.oauid
object’s login user ID

type: keyword

auditd.data.old
old value

type: keyword

auditd.data.banners
banners used on printed page

type: keyword

auditd.data.feature
kernel feature being changed

type: keyword

auditd.data.vm-ctx
the vm’s context string

type: keyword

auditd.data.opid
object’s process ID

type: keyword

auditd.data.seperms
SELinux permissions being used

type: keyword

auditd.data.seresult
SELinux AVC decision granted/denied

type: keyword

auditd.data.new-rng
device name of rng being added from a vm

type: keyword

auditd.data.old-net
present MAC address assigned to vm

type: keyword

auditd.data.sigev_signo
signal number

type: keyword

auditd.data.ino
inode number

type: keyword

auditd.data.old_enforcing
old MAC enforcement status

type: keyword

auditd.data.old-vcpu
present number of CPU cores

type: keyword

auditd.data.range
user’s SE Linux range

type: keyword

auditd.data.res
result of the audited operation(success/fail)

type: keyword

auditd.data.added
number of new files detected

type: keyword

auditd.data.fam
socket address family

type: keyword

auditd.data.nlnk-pid
pid of netlink packet sender

type: keyword

auditd.data.subj
lspp subject’s context string

type: keyword

auditd.data.a[0-3]
the arguments to a syscall

type: keyword

auditd.data.cgroup
path to cgroup in sysfs

type: keyword

auditd.data.kernel
kernel’s version number

type: keyword

auditd.data.ocomm
object’s command line name

type: keyword

auditd.data.new-net
MAC address being assigned to vm

type: keyword

auditd.data.permissive
SELinux is in permissive mode

type: keyword

auditd.data.class
resource class assigned to vm

type: keyword

auditd.data.compat
is_compat_task result

type: keyword

auditd.data.fi
file assigned inherited capability map

type: keyword

auditd.data.changed
number of changed files

type: keyword

auditd.data.msg
the payload of the audit record

type: keyword

auditd.data.dport
remote port number

type: keyword

auditd.data.new-seuser
new SELinux user

type: keyword

auditd.data.invalid_context
SELinux context

type: keyword

auditd.data.dmac
remote MAC address

type: keyword

auditd.data.ipx-net
IPX network number

type: keyword

auditd.data.iuid
ipc object’s user ID

type: keyword

auditd.data.macproto
ethernet packet type ID field

type: keyword

auditd.data.obj
lspp object context string

type: keyword

auditd.data.ipid
IP datagram fragment identifier

type: keyword

auditd.data.new-fs
file system being added to vm

type: keyword

auditd.data.vm-pid
vm’s process ID

type: keyword

auditd.data.cap_pi
process inherited capability map

type: keyword

auditd.data.old-auid
previous auid value

type: keyword

auditd.data.oses
object’s session ID

type: keyword

auditd.data.fd
file descriptor number

type: keyword

auditd.data.igid
ipc object’s group ID

type: keyword

auditd.data.new-disk
disk being added to vm

type: keyword

auditd.data.parent
the inode number of the parent file

type: keyword

auditd.data.len
length

type: keyword

auditd.data.oflag
open syscall flags

type: keyword

auditd.data.uuid
a UUID

type: keyword

auditd.data.code
seccomp action code

type: keyword

auditd.data.nlnk-grp
netlink group number

type: keyword

auditd.data.cap_fp
file permitted capability map

type: keyword

auditd.data.new-mem
new amount of memory in KB

type: keyword

auditd.data.seperm
SELinux permission being decided on

type: keyword

auditd.data.enforcing
new MAC enforcement status

type: keyword

auditd.data.new-chardev
new character device being assigned to vm

type: keyword

auditd.data.old-rng
device name of rng being removed from a vm

type: keyword

auditd.data.outif
out interface number

type: keyword

auditd.data.cmd
command being executed

type: keyword

auditd.data.hook
netfilter hook that packet came from

type: keyword

auditd.data.new-level
new run level

type: keyword

auditd.data.sauid
sent login user ID

type: keyword

auditd.data.sig
signal number

type: keyword

auditd.data.audit_backlog_wait_time
audit system’s backlog wait time

type: keyword

auditd.data.printer
printer name

type: keyword

auditd.data.old-mem
present amount of memory in KB

type: keyword

auditd.data.perm
the file permission being used

type: keyword

auditd.data.old_pi
old process inherited capability map

type: keyword

auditd.data.state
audit daemon configuration resulting state

type: keyword

auditd.data.format
audit log’s format

type: keyword

auditd.data.new_gid
new group ID being assigned

type: keyword

auditd.data.tcontext
the target’s or object’s context string

type: keyword

auditd.data.maj
device major number

type: keyword

auditd.data.watch
file name in a watch record

type: keyword

auditd.data.device
device name

type: keyword

auditd.data.grp
group name

type: keyword

auditd.data.bool
name of SELinux boolean

type: keyword

auditd.data.icmp_type
type of icmp message

type: keyword

auditd.data.new_lock
new value of feature lock

type: keyword

auditd.data.old_prom
network promiscuity flag

type: keyword

auditd.data.acl
access mode of resource assigned to vm

type: keyword

auditd.data.ip
network address of a printer

type: keyword

auditd.data.new_pi
new process inherited capability map

type: keyword

auditd.data.default-context
default MAC context

type: keyword

auditd.data.inode_gid
group ID of the inode’s owner

type: keyword

auditd.data.new-log_passwd
new value for TTY password logging

type: keyword

auditd.data.new_pe
new process effective capability map

type: keyword

auditd.data.selected-context
new MAC context assigned to session

type: keyword

auditd.data.cap_fver
file system capabilities version number

type: keyword

auditd.data.file
file name

type: keyword

auditd.data.net
network MAC address

type: keyword

auditd.data.virt
kind of virtualization being referenced

type: keyword

auditd.data.cap_pp
process permitted capability map

type: keyword

auditd.data.old-range
present SELinux range

type: keyword

auditd.data.resrc
resource being assigned

type: keyword

auditd.data.new-range
new SELinux range

type: keyword

auditd.data.obj_gid
group ID of object

type: keyword

auditd.data.proto
network protocol

type: keyword

auditd.data.old-disk
disk being removed from vm

type: keyword

auditd.data.audit_failure
audit system’s failure mode

type: keyword

auditd.data.inif
in interface number

type: keyword

auditd.data.vm
virtual machine name

type: keyword

auditd.data.flags
mmap syscall flags

type: keyword

auditd.data.nlnk-fam
netlink protocol number

type: keyword

auditd.data.old-fs
file system being removed from vm

type: keyword

auditd.data.old-ses
previous ses value

type: keyword

auditd.data.seqno
sequence number

type: keyword

auditd.data.fver
file system capabilities version number

type: keyword

auditd.data.qbytes
ipc objects quantity of bytes

type: keyword

auditd.data.seuser
user’s SE Linux user acct

type: keyword

auditd.data.cap_fe
file assigned effective capability map

type: keyword

auditd.data.new-vcpu
new number of CPU cores

type: keyword

auditd.data.old-level
old run level

type: keyword

auditd.data.old_pp
old process permitted capability map

type: keyword

auditd.data.daddr
remote IP address

type: keyword

auditd.data.old-role
present SELinux role

type: keyword

auditd.data.ioctlcmd
The request argument to the ioctl syscall

type: keyword

auditd.data.smac
local MAC address

type: keyword

auditd.data.apparmor
apparmor event information

type: keyword

auditd.data.fe
file assigned effective capability map

type: keyword

auditd.data.perm_mask
file permission mask that triggered a watch event

type: keyword

auditd.data.ses
login session ID

type: keyword

auditd.data.cap_fi
file inherited capability map

type: keyword

auditd.data.obj_uid
user ID of object

type: keyword

auditd.data.reason
text string denoting a reason for the action

type: keyword

auditd.data.list
the audit system’s filter list number

type: keyword

auditd.data.old_lock
present value of feature lock

type: keyword

auditd.data.bus
name of subsystem bus a vm resource belongs to

type: keyword

auditd.data.old_pe
old process effective capability map

type: keyword

auditd.data.new-role
new SELinux role

type: keyword

auditd.data.prom
network promiscuity flag

type: keyword

auditd.data.uri
URI pointing to a printer

type: keyword

auditd.data.audit_enabled
audit systems’s enable/disable status

type: keyword

auditd.data.old-log_passwd
present value for TTY password logging

type: keyword

auditd.data.old-seuser
present SELinux user

type: keyword

auditd.data.per
linux personality

type: keyword

auditd.data.scontext
the subject’s context string

type: keyword

auditd.data.tclass
target’s object classification

type: keyword

auditd.data.ver
audit daemon’s version number

type: keyword

auditd.data.new
value being set in feature

type: keyword

auditd.data.val
generic value associated with the operation

type: keyword

auditd.data.img-ctx
the vm’s disk image context string

type: keyword

auditd.data.old-chardev
present character device assigned to vm

type: keyword

auditd.data.old_val
current value of SELinux boolean

type: keyword

auditd.data.success
whether the syscall was successful or not

type: keyword

auditd.data.inode_uid
user ID of the inode’s owner

type: keyword

auditd.data.removed
number of deleted files

type: keyword

auditd.data.socket.port
The port number.

type: keyword

auditd.data.socket.saddr
The raw socket address structure.

type: keyword

auditd.data.socket.addr
The remote address.

type: keyword

auditd.data.socket.family
The socket family (unix, ipv4, ipv6, netlink).

type: keyword

example: unix

auditd.data.socket.path
This is the path associated with a unix socket.

type: keyword

auditd.messages
An ordered list of the raw messages received from the kernel that were used to construct this document. This field is present if an error occurred processing the data or if include_raw_message is set in the config.

type: alias

alias to: event.original

auditd.warnings
The warnings generated by the Beat during the construction of the event. These are disabled by default and are used for development and debug purposes only.

type: alias

alias to: error.message

The geoip fields are defined as a convenience in case you decide to enrich the data using a geoip filter in Logstash or an Elasticsearch geoip ingest processor.

geoip.continent_name
The name of the continent.

type: keyword

geoip.city_name
The name of the city.

type: keyword

geoip.region_name
The name of the region.

type: keyword

geoip.country_iso_code
Country ISO code.

type: keyword

geoip.location
The longitude and latitude.

type: geo_point