Loading

Decode CEF

The decode_cef processor decodes Common Event Format (CEF) messages. It follows the specification defined in Micro Focus Security ArcSight Common Event Format, Version 25. This processor is available in Filebeat. This is an example CEF message.

CEF:0|SomeVendor|TheProduct|1.0|100|connection to malware C2 successfully stopped|10|src=192.0.2.10 dst=203.0.113.2 spt=31224

Any content that precedes CEF: is ignored. This allows the processor to directly parse CEF content from messages that contain syslog headers.

Below is an example configuration that decodes the message field as CEF after renaming it to event.original. It is best to rename message to event.original because the decoded CEF data contains its own message field.

processors:
  - rename:
      fields:
        - {from: "message", to: "event.original"}
  - decode_cef:
      field: event.original

The decode_cef processor has the following configuration settings.

Name Required Default Description
field no message Source field containing the CEF message to be parsed.
target_field no cef Target field where the parsed CEF object will be written.
ecs no true Generate Elastic Common Schema (ECS) fields from the CEF data. Certain CEF header and extension values will be used to populate ECS fields.
timezone no UTC IANA time zone name (e.g. America/New_York) or fixed time offset (e.g. +0200) to use when parsing times that do not contain a time zone. Local may be specified to use the machine’s local time zone.
ignore_missing no false Ignore errors when the source field is missing.
ignore_failure no false Ignore failures when the source field does not contain a CEF message.
ignore_empty_values no false Ignore CEF extensions with empty values (e.g. spt= type=1)
id no An identifier for this processor instance. Useful for debugging.