Skip to main content

Attributes You Can Map to Records

This topic lists the schema attributes that you can map to Records. Note that you can map any of the attributes defined below to any record type. For information about all schema attributes, including those that cannot be mapped to Records, for example enrichment fields, see Schema Attributes.  

FieldTypeDescription
accountIdstringAccount identifiers used in logs from environments where multiple accounts can be used. This is common for cloud providers like AWS.
actionstringIndicates the action taken by the monitored product (the log producer) when something harmful occurred. For example, when a firewall log indicated a bad network packet, the firewall blocked the connection.
applicationstringThe name of the software that is the subject of this message.   Of interest to those who write mappers: Sometimes this software is the source of the message. In other cases a single source may produce messages related to many different applications and must name them explicitly.
authProviderstringThe SSO provider for an authentication attempt. Often found in cloud authentication events and is expected to be NULL if SSO was not used for the authentication attempt.
baseImagestringThe base image of a process (ie notepad.exe)
bytesInlongAmount of the data received in bytes.
bytesOutlongAmount of the data sent in bytes.
causestringDescribes the reason for an outcome in a record in a common way.
changeTargetstringThe user account that was affected by a change.
changeTypestringCategory of change the user made.
cloud_providerstringThe name of the cloud infrastructure operator, typically a public cloud provider. E.g. Google Cloud Platform (GCP), Amazon Web Services (AWS), Microsoft Azure, Alibaba Cloud etc.
cloud_regionstringThe physical location a cloud provider operates their infrastructure from. E.g. AWS us-east-2 (Ohio), Azure Central US (Iowa), GCP asia-northeast1-a (Tokyo) etc.
cloud_servicestringThe specific service offering from a cloud provider. E.g. AWS VPC Flow, Azure Virtual Machines, AWS Lambda, Alibaba Cloud ECS, GCP Compute Engine etc.
cloud_zonestringThe cloud infrastructure isolated within a region on which a resource is located or is running.
commandLinestringThe command run by the user using a shell.
descriptionstringThe description of the log event.
device_container_idstringThe unique identifier provided to a discrete container which packages together the elements required to run software.
device_container_namestringThe name provided to a discrete container which packages together the elements required to run software.
device_container_runtimestringThe provider name of the engine whine underpins the container. E.g. Docker, AWS Lambda, containerd
device_hostnamestringFully Qualified Domain Name that uniquely and absolutely names a computer. If name normalization occurs this will be the normalized name.
device_imagestringThe snapshot of the state of a device or similar which can be used to deploy or reproduce a system. E.g. A VM image, a container image.
device_ipstringThe native assigned IP address of the device.
device_k8s_deploymentstringThe deployment name described in the log.
device_k8s_namespacestringThe namespace name within which resources are running as described in the log.
device_k8s_podstringThe name given to a pod described in the log.
device_k8s_replicaSetstringThe replica set name described in the log.
device_macstringThe hardware identification number that uniquely identifies the device on a network
device_natIpstringThe external IP in cases where the internal IP goes through network address translation.
device_osNamestringOperating system controlling on this device.
device_typestringThe instance, compute, or machine type. Typically used in cloud environments to describe computing specifications.
device_uniqueIdstringThe source specific identifier for device (if available). This is frequently an instance id in cloud environments.
dns_querystringThe entire request made from the client machine to the DNS server.
dns_queryDomainstringThis should be conditionally populated if the DNS request contains a domain.
dns_queryTypestringThe type of query that was made by the client machine.
dns_replystringThe DNS reply which can be a single record or multiple records concatenated into a string.
dns_replyDomainstringThis should be conditionally populated if the DNS reply is a domain.
dns_replyIpstringThis should be conditionally populated if the DNS reply is an IP address.
dns_returnCodestringCode indicating the outcome of a DNS request.
dstDevice_container_idstringThe unique identifier provided to a discrete container which packages together the elements required to run software.
dstDevice_container_namestringThe name provided to a discrete container which packages together the elements required to run software.
dstDevice_container_runtimestringThe provider name of the engine whine underpins the container. E.g. Docker, AWS Lambda, containerd.
dstDevice_hostnamestringFully Qualified Domain Name that uniquely and absolutely names a computer. If name normalization occurs this will be the normalized name.
dstDevice_imagestringThe snapshot of the state of a device or similar which can be used to deploy or reproduce a system for which traffic is destined. E.g. A VM image, a container image.
dstDevice_ipstringThe native assigned IP address of the device.
dstDevice_k8s_deploymentstringThe deployment name described in the log.
dstDevice_k8s_namespacestringThe namespace name within which resources are running as described in the log.
dstDevice_k8s_podstringThe name given to a pod described in the log.
dstDevice_k8s_replicaSetstringThe replica set name described in the log.
dstDevice_macstringThe hardware identification number that uniquely identifies the device on a network
dstDevice_natIpstringThe external IP in cases where the internal IP goes through network address translation.
dstDevice_osNamestringOperating system controlling on this device.
dstDevice_typestringThe instance, compute, or machine type which network traffic is destined to. Typically used in cloud environments to describe computing specifications.
dstDevice_uniqueIdstringThe source specific identifier for device (if available). This is frequently an instance id in cloud environments.
dstPortintThe destination port for the network transaction.
email_messageIdstringUnique identifier of the email.
email_recipientstringAddress of the e-mail recipient. Note that only a single recipient can be mapped from a log. To be used only for logs related specifically to e-mail activity (spam filtering, message tracking, etc).
email_senderstringEmail of the user that sent the email.
email_subjectstringSubject of the email.
errorCodestringMachine code or shortform message that represents a specific error.
errorTextstringHuman readable description of a specific error.
file_basenamestringThe base file name plus extension (if present) minus any path components.
file_hash_imphashstringFile hash created using the IMPHASH algorithm.
file_hash_md5stringFile hash created using the MD5 algorithm.
file_hash_pehashstringFile hash created using the PEHASH algorithm.
file_hash_sha1stringFile hash created using the SHA1 algorithm.
file_hash_sha256stringFile hash created using the SHA256 algorithm.
file_hash_ssdeepstringFile hash created using the SSDEEP algorithm.
file_mimeTypestringTwo-part identifier for file formats and format contents transmitted on the Internet.
file_pathstringThe full path (if possible) of the file. This field may contain partial paths and serves as the general place holder for path fields.
file_sizelongCount of bytes taken up by the file.
file_uidstringThe data source specific unique identifier for the file.
flowStatestringThe state of the flow when the netflow log was generated.
http_categorystringThe high level category determined by a service based on the url or domain.
http_contentLengthintThe number of bytes of data in the body of the response.
http_hostnamestringHostname from the client request
http_methodstringType of request being made. (e.g. GET or POST)
http_refererstringIdentifies the address of the webpage (i.e. the URI or IRI) which is linked to the resource being requested.
http_requestHeadersstringA map of the HTTP request headers.
http_response_contentLengthintThe number of bytes of data in the body of the response
http_response_contentTypestringThe format of the data in the HTTP response.
http_response_statusCodeintThe HTTP response code for a request.
http_response_statusTextstringContains the status message corresponding to the status code.
http_urlstringURL that the request is being made to.
http_userAgentstringSoftware agent that is acting on behalf of a user.
ipProtocolstringThe internet protocol used in the traffic that generated the log event. This should be the IP protocol keyword or the protocol number, such as ICMP or 1, TCP or 6, UDP or 1.
logonTypestringThe type of authentication or logon that occurred.
mfabooleanTrue or false showing whether or not an authentication event was performed with multi-factor authentication.
moduleTypestringThe type of files loaded by a process to extend functionally such as DLLs.
normalizedActionstringComplementary to the Action field, this field describes the initiation of an activity in a common way across records. normalizedAction is meant to describe the attempt of an action, using the success boolean as a modifier indicating whether or not the action was successful. Further, normalizedAction should be paired with normalizedResource to indicate where or upon what the initiated action was attempted against.
normalizedCausestringComplementary to Cause, this field describes the reason for any particular outcome in a record in a common way.
normalizedResourcestringComplementary to Resource, this field describes the resource being acted upon or otherwise referenced within a record in a common way across records. Intended to be used to provide further normalized context to a record, particularly in tandem with normalizedAction.
normalizedSeverityintA normalized severity score, on a 1-5 scale with 1 being Informational and 5 being Critical.
packetsInlongThe count of packets received in a network connection.
packetsOutlongThe count of packets sent in a network connection.
parentBaseImagestringThe base image name of a parent process (ie notepad.exe)
parentCommandLinestringThe command line of a parent process
parentPidintThe process id of the program that initiated a process.
pidintThe process id of the process itself.
processUidstringA unique process identifier provided by the source record.
resourcestringA generic place holder for the resource being accessed within a log.
resourceTypestringGeneralized field to help describe the nature of a resource. Used when a resource exists for which there is no more specific field specified for that type of resource. (e.g. a file is a type of resource, file_basename exists to capture the name of the file and describes the type).
sessionIdstringAn ephemeral and at least semi-unique identifier of a connection between two systems. E.g. HTTP session, user logon session, TCP session identifiers.
severitystringThe source specific severity level with no normalization.
sourceUidstringA UID that is defined by the record itself. Each record is assigned a UID during mapping, but this is the unique identifier field that may exist within an originating record.
srcDevice_container_idstringThe unique identifier provided to a discrete container which packages together the elements required to run software.
srcDevice_container_namestringThe name provided to a discrete container which packages together the elements required to run software.
srcDevice_container_runtimestringThe provider name of the engine whine underpins the container. E.g. Docker, AWS Lambda, containerd.
srcDevice_hostnamestringFully Qualified Domain Name that uniquely and absolutely names a computer. If name normalization occurs this will be the normalized name.
srcDevice_imagestringThe snapshot of the state of a device or similar which can be used to deploy or reproduce a system for which traffic is originating. E.g. A VM image, a container image.
srcDevice_ipstringThe native assigned IP address of the device.
srcDevice_k8s_deploymentstringThe deployment name described in the log.
srcDevice_k8s_namespacestringThe namespace name within which resources are running as described in the log.
srcDevice_k8s_podstringThe name given to a pod described in the log.
srcDevice_k8s_replicaSetstringThe replica set name described in the log.
srcDevice_macstringThe hardware identification number that uniquely identifies the device on a network
srcDevice_natIpstringThe external IP in cases where the internal IP goes through network address translation.
srcDevice_osNamestringOperating system controlling on this device.
srcDevice_typestringThe instance, compute, or machine type which network traffic originated from. Typically used in cloud environments to describe computing specifications.
srcDevice_uniqueIdstringThe source specific identifier for device (if available). This is frequently an instance id in cloud environments.
srcPortintThe port used to initiate a network connection.
successbooleanBoolean value to show whether or not an action was successful.
targetUser_authDomainstringThe authentication domain of a user which is subject to or is otherwise impacted by activity undertaken by another user. Such as the Active Directory domain to which a new user account being created belongs.
targetUser_emailstringE-Mail address associated with the user which is subject to activity undertaken by another account. Such as an E-Mail address which was created for a new user account.
targetUser_rolestringA privileged persona assumed by a user which is subject to activity undertaken by another user. Such as in CloudTrail logs as well as similar cases where a user is recorded taking on a different role for specific privileged activity.
targetUser_userIdstringThe semi-unique identifier associated with a user account which is subject to activity undertaken by another user account.
targetUser_usernamestringThe name commonly used to identify the user. May include the domain. If name normalization occurs, this will be the normalized name.
tcpProtocolstringApplication layer protocol used to establish the connection.
threat_categorystringThe type of threat determined by a service based on the signature or threat name.
threat_identifierstringThe identifier or indicator specific to a threat. Generally speaking this should be populated with an indicator value.
threat_namestringName of the threat.
threat_referenceUrlstringA external URL that can provide more information about the threat. This should NOT be the URL that represents an observed HTTP request.
threat_ruleTypestringThis field should be used with logs that indicate detection of a security event has already occurred. These logs are produced by a security product's own detection capabilities like signatures or rule sets.
threat_signalNamestringThis field is used in conjunction with normalized rules designed to directly pass through security alerts from other security products, appliances, and services. Those rules will use the text populated in this field as an element of the signal name, allowing different signal names for different products while retaining the normalized rule logic.
threat_signalSummarystringThis field is used in conjunction with normalized rules. Those rules will use the text populated in this field as an element of the signal summary, allowing different signal summaries for different products while retaining the normalized rule logic.
timestamplongThe timestamp of the event in milliseconds since epoch.
user_authDomainstringThe domain associated with this particular user. (e.g. sumologic.com, sumologic.local)
user_emailstringThe associated email address assigned to this user.
user_rolestringA privileged persona which is assumed by an acting user. Such as in CloudTrail logs as well as similar cases where a user is recorded taking on a different role for specific privileged activity.
user_userIdstringThe source unique identifier for the user account.
user_usernamestringThe name commonly used to identify the user. Does not include domain. If name normalization occurs, this will be the normalized name.
vuln_bugtraqstringBugTraq is a full disclosure moderated mailing list for the detailed discussion and announcement of computer security vulnerabilities.
vuln_certstringCERT Coordination Center (CERT/CC) prioritizes coordination efforts on vulnerabilities.
vuln_cvestringCommon Vulnerabilities and Exposures identifier for the vulnerability.
vuln_cvssstringCVSS attempts to assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat.
vuln_namestringName of the vulnerability.
vuln_referencestringLocation to find more information on the vulnerability.
Legal
Privacy Statement
Terms of Use

Copyright © 2023 by Sumo Logic, Inc.