Skip to content

Zeek参考

提取工具

kascas/Zeek_Fields_Extractor

Logs and Fields

Protocols

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
conn.log TCP/UDP/ICMP connections id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
conn.log TCP/UDP/ICMP connections uid string &log A unique identifier of the connection.
conn.log TCP/UDP/ICMP connections ts time &log This is the time of the first packet.
conn.log TCP/UDP/ICMP connections speculative_service string &log &optional (present if policy/protocols/conn/speculative-service.zeek is loaded) Protocol that was determined by a matching signature after the beginning of a connection. In this situation no analyzer can be attached and hence the data cannot be analyzed nor the protocol can be confirmed.
conn.log TCP/UDP/ICMP connections inner_vlan int &log &optional (present if policy/protocols/conn/vlan-logging.zeek is loaded) The inner VLAN for this connection, if applicable.
conn.log TCP/UDP/ICMP connections vlan int &log &optional (present if policy/protocols/conn/vlan-logging.zeek is loaded) The outer VLAN for this connection, if applicable.
conn.log TCP/UDP/ICMP connections resp_l2_addr string &log &optional (present if policy/protocols/conn/mac-logging.zeek is loaded) Link-layer address of the responder, if available.
conn.log TCP/UDP/ICMP connections orig_l2_addr string &log &optional (present if policy/protocols/conn/mac-logging.zeek is loaded) Link-layer address of the originator, if available.
conn.log TCP/UDP/ICMP connections tunnel_parents set [string] &log &optional If this connection was over a tunnel, indicate the uid values for any encapsulating parent connections used over the lifetime of this inner connection.
conn.log TCP/UDP/ICMP connections resp_ip_bytes count &log &optional Number of IP level bytes that the responder sent (as seen on the wire, taken from the IP total_length header field). Only set if use_conn_size_analyzer = T.
conn.log TCP/UDP/ICMP connections resp_pkts count &log &optional Number of packets that the responder sent. Only set if use_conn_size_analyzer = T.
conn.log TCP/UDP/ICMP connections orig_ip_bytes count &log &optional Number of IP level bytes that the originator sent (as seen on the wire, taken from the IP total_length header field). Only set if use_conn_size_analyzer = T.
conn.log TCP/UDP/ICMP connections orig_pkts count &log &optional Number of packets that the originator sent. Only set if use_conn_size_analyzer = T.
conn.log TCP/UDP/ICMP connections history string &log &optional Records the state history of connections as a string of letters. The meaning of those letters is: Letter Meaning s a SYN w/o the ACK bit set h a SYN+ACK ("handshake") a a pure ACK d packet with payload ("data") f packet with FIN bit set r packet with RST bit set c packet with a bad checksum (applies to UDP too) g a content gap t packet with retransmitted payload w packet with a zero window advertisement i inconsistent packet (e.g. FIN+RST bits set) q multi-flag packet (SYN+FIN or SYN+RST bits set) ^ connection direction was flipped by Zeek's heuristic If the event comes from the originator, the letter is in upper-case; if it comes from the responder, it's in lower-case. The 'a', 'd', 'i' and 'q' flags are recorded a maximum of one time in either direction regardless of how many are actually seen. 'f', 'h', 'r' and 's' can be recorded multiple times for either direction if the associated sequence number differs from the last-seen packet of the same flag type. 'c', 'g', 't' and 'w' are recorded in a logarithmic fashion: the second instance represents that the event was seen (at least) 10 times; the third instance, 100 times; etc.
conn.log TCP/UDP/ICMP connections missed_bytes count &log &default = 0 &optional Indicates the number of bytes missed in content gaps, which is representative of packet loss. A value other than zero will normally cause protocol analysis to fail but some analysis may have been completed prior to the packet loss.
conn.log TCP/UDP/ICMP connections local_resp bool &log &optional If the connection is responded to locally, this value will be T. If it was responded to remotely it will be F. In the case that the Site::local_nets variable is undefined, this field will be left empty at all times.
conn.log TCP/UDP/ICMP connections local_orig bool &log &optional If the connection is originated locally, this value will be T. If it was originated remotely it will be F. In the case that the Site::local_nets variable is undefined, this field will be left empty at all times.
conn.log TCP/UDP/ICMP connections conn_state string &log &optional Possible conn_state values: S0: Connection attempt seen, no reply. S1: Connection established, not terminated. SF: Normal establishment and termination. Note that this is the same symbol as for state S1. You can tell the two apart because for S1 there will not be any byte counts in the summary, while for SF there will be. REJ: Connection attempt rejected. S2: Connection established and close attempt by originator seen (but no reply from responder). S3: Connection established and close attempt by responder seen (but no reply from originator). RSTO: Connection established, originator aborted (sent a RST). RSTR: Responder sent a RST. RSTOS0: Originator sent a SYN followed by a RST, we never saw a SYN-ACK from the responder. RSTRH: Responder sent a SYN ACK followed by a RST, we never saw a SYN from the (purported) originator. SH: Originator sent a SYN followed by a FIN, we never saw a SYN ACK from the responder (hence the connection was "half" open). SHR: Responder sent a SYN ACK followed by a FIN, we never saw a SYN from the originator. OTH: No SYN seen, just midstream traffic (one example of this is a "partial connection" that was not later closed).
conn.log TCP/UDP/ICMP connections resp_bytes count &log &optional The number of payload bytes the responder sent. See orig_bytes.
conn.log TCP/UDP/ICMP connections service string &log &optional An identification of an application protocol being sent over the connection.
conn.log TCP/UDP/ICMP connections orig_bytes count &log &optional The number of payload bytes the originator sent. For TCP this is taken from sequence numbers and might be inaccurate (e.g., due to large connections).
conn.log TCP/UDP/ICMP connections duration interval &log &optional How long the connection lasted. For 3-way or 4-way connection tear-downs, this will not include the final ACK.
conn.log TCP/UDP/ICMP connections proto transport_proto &log The transport layer protocol of the connection.
dce_rpc.log Distributed Computing Environment/RPC id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
dce_rpc.log Distributed Computing Environment/RPC rtt interval &log &optional Round trip time from the request to the response. If either the request or response wasn't seen, this will be null.
dce_rpc.log Distributed Computing Environment/RPC operation string &log &optional Operation seen in the call.
dce_rpc.log Distributed Computing Environment/RPC uid string &log Unique ID for the connection.
dce_rpc.log Distributed Computing Environment/RPC ts time &log Timestamp for when the event happened.
dce_rpc.log Distributed Computing Environment/RPC named_pipe string &log &optional Remote pipe name.
dce_rpc.log Distributed Computing Environment/RPC endpoint string &log &optional Endpoint name looked up from the uuid.
dhcp.log DHCP leases server_software string &log &optional (present if policy/protocols/dhcp/software.zeek is loaded) Software reported by the server in the vendor_class option.
dhcp.log DHCP leases client_software string &log &optional (present if policy/protocols/dhcp/software.zeek is loaded) Software reported by the client in the vendor_class option.
dhcp.log DHCP leases client_addr addr &log &optional IP address of the client. If a transaction is only a client sending INFORM messages then there is no lease information exchanged so this is helpful to know who sent the messages. Getting an address in this field does require that the client sources at least one DHCP message using a non-broadcast address.
dhcp.log DHCP leases uids set [string] &log A series of unique identifiers of the connections over which DHCP is occurring. This behavior with multiple connections is unique to DHCP because of the way it uses broadcast packets on local networks.
dhcp.log DHCP leases mac string &log &optional Client's hardware address.
dhcp.log DHCP leases client_port port &optional Client port number seen at time of server handing out IP (expected as 68/udp).
dhcp.log DHCP leases subscriber_id string &log &optional (present if policy/protocols/dhcp/sub-opts.zeek is loaded) The subscriber ID is a value independent of the physical network configuration so that a customer's DHCP configuration can be given to them correctly no matter where they are physically connected.
dhcp.log DHCP leases ts time &log The earliest time at which a DHCP message over the associated connection is observed.
dhcp.log DHCP leases server_addr addr &log &optional IP address of the server involved in actually handing out the lease. There could be other servers replying with OFFER messages which won't be represented here. Getting an address in this field also requires that the server handing out the lease also sources packets from a non-broadcast IP address.
dhcp.log DHCP leases circuit_id string &log &optional (present if policy/protocols/dhcp/sub-opts.zeek is loaded) Added by DHCP relay agents which terminate switched or permanent circuits. It encodes an agent-local identifier of the circuit from which a DHCP client-to-server packet was received. Typically it should represent a router or switch interface number.
dhcp.log DHCP leases server_port port &optional Server port number seen at time of server handing out IP (expected as 67/udp).
dhcp.log DHCP leases host_name string &log &optional Name given by client in Hostname option 12.
dhcp.log DHCP leases client_fqdn string &log &optional FQDN given by client in Client FQDN option 81.
dhcp.log DHCP leases domain string &log &optional Domain given by the server in option 15.
dhcp.log DHCP leases requested_addr addr &log &optional IP address requested by the client.
dhcp.log DHCP leases assigned_addr addr &log &optional IP address assigned by the server.
dhcp.log DHCP leases lease_time interval &log &optional IP address lease interval.
dhcp.log DHCP leases duration interval &log &default = 0 secs &optional Duration of the DHCP "session" representing the time from the first message to the last.
dhcp.log DHCP leases client_message string &log &optional Message typically accompanied with a DHCP_DECLINE so the client can tell the server why it rejected an address.
dhcp.log DHCP leases agent_remote_id string &log &optional (present if policy/protocols/dhcp/sub-opts.zeek is loaded) A globally unique identifier added by relay agents to identify the remote host end of the circuit.
dhcp.log DHCP leases server_message string &log &optional Message typically accompanied with a DHCP_NAK to let the client know why it rejected the request.
dhcp.log DHCP leases msg_types vector of string &log &default = [] &optional The DHCP message types seen by this DHCP transaction
dhcp.log DHCP leases client_chaddr string &optional The CHADDR field sent by the client.
dhcp.log DHCP leases msg_orig vector of addr &log &default = [] &optional (present if policy/protocols/dhcp/msg-orig.zeek is loaded) The address that originated each message from the msg_types field.
dnp3.log DNP3 requests and replies iin count &log &optional The response's "internal indication number".
dnp3.log DNP3 requests and replies fc_reply string &log &optional The name of the function message in the reply.
dnp3.log DNP3 requests and replies fc_request string &log &optional The name of the function message in the request.
dnp3.log DNP3 requests and replies uid string &log Unique identifier for the connection.
dnp3.log DNP3 requests and replies ts time &log Time of the request.
dnp3.log DNP3 requests and replies id conn_id &log Identifier for the connection.
dns.log DNS activity original_query string &log &optional (present if policy/protocols/dns/log-original-query-case.zeek is loaded) Query with original letter casing
dns.log DNS activity addl set [string] &log &optional (present if policy/protocols/dns/auth-addl.zeek is loaded) Additional responses for the query.
dns.log DNS activity auth set [string] &log &optional (present if policy/protocols/dns/auth-addl.zeek is loaded) Authoritative responses for the query.
dns.log DNS activity saw_reply bool &default = F &optional Whether the full DNS reply has been seen.
dns.log DNS activity saw_query bool &default = F &optional Whether the full DNS query has been seen.
dns.log DNS activity total_replies count &optional The total number of resource records in a reply message's answer, authority, and additional sections.
dns.log DNS activity total_answers count &optional The total number of resource records in a reply message's answer section.
dns.log DNS activity rejected bool &log &default = F &optional The DNS query was rejected by the server.
dns.log DNS activity TTLs vector of interval &log &optional The caching intervals of the associated RRs described by the answers field.
dns.log DNS activity answers vector of string &log &optional The set of resource descriptions in the query answer.
dns.log DNS activity Z count &log &default = 0 &optional A reserved field that is usually zero in queries and responses.
dns.log DNS activity RA bool &log &default = F &optional The Recursion Available bit in a response message indicates that the name server supports recursive queries.
dns.log DNS activity RD bool &log &default = F &optional The Recursion Desired bit in a request message indicates that the client wants recursive service for this query.
dns.log DNS activity TC bool &log &default = F &optional The Truncation bit specifies that the message was truncated.
dns.log DNS activity AA bool &log &default = F &optional The Authoritative Answer bit for response messages specifies that the responding name server is an authority for the domain name in the question section.
dns.log DNS activity rcode_name string &log &optional A descriptive name for the response code value.
dns.log DNS activity qtype_name string &log &optional A descriptive name for the type of the query.
dns.log DNS activity qtype count &log &optional A QTYPE value specifying the type of the query.
dns.log DNS activity proto transport_proto &log The transport layer protocol of the connection.
dns.log DNS activity id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
dns.log DNS activity qclass_name string &log &optional A descriptive name for the class of the query.
dns.log DNS activity uid string &log A unique identifier of the connection over which DNS messages are being transferred.
dns.log DNS activity ts time &log The earliest time at which a DNS protocol message over the associated connection is observed.
dns.log DNS activity qclass count &log &optional The QCLASS value specifying the class of the query.
dns.log DNS activity query string &log &optional The domain name that is the subject of the DNS query.
dns.log DNS activity rcode count &log &optional The response code value in DNS response messages.
dns.log DNS activity rtt interval &log &optional Round trip time for the query and response. This indicates the delay between when the request was seen until the answer started.
dns.log DNS activity trans_id count &log &optional A 16-bit identifier assigned by the program that generated the DNS query. Also used in responses to match up replies to outstanding queries.
ftp.log FTP activity user string &log &default = "" &optional User name for the current FTP session.
ftp.log FTP activity command string &log &optional Command given by the client.
ftp.log FTP activity arg string &log &optional Argument for the command if one is given.
ftp.log FTP activity id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
ftp.log FTP activity fuid string &optional &log (present if base/protocols/ftp/files.zeek is loaded) File unique ID.
ftp.log FTP activity capture_password bool &default = FTP::default_capture_password &optional Determines if the password will be captured for this request.
ftp.log FTP activity passive bool &default = F &optional Indicates if the session is in active or passive mode.
ftp.log FTP activity mime_type string &log &optional Sniffed mime type of file.
ftp.log FTP activity last_auth_requested string &optional (present if base/protocols/ftp/gridftp.zeek is loaded)
ftp.log FTP activity uid string &log Unique ID for the connection.
ftp.log FTP activity pending_commands FTP::PendingCmds Queue for commands that have been sent but not yet responded to are tracked here.
ftp.log FTP activity cmdarg FTP::CmdArg &optional Command that is currently waiting for a response.
ftp.log FTP activity reply_code count &log &optional Reply code from the server in response to the command.
ftp.log FTP activity cwd string &default = "." &optional Current working directory that this session is in. By making the default value '.', we can indicate that unless something more concrete is discovered that the existing but unknown directory is ok to use.
ftp.log FTP activity data_channel FTP::ExpectedDataChannel &log &optional Expected FTP data channel.
ftp.log FTP activity reply_msg string &log &optional Reply message from the server in response to the command.
ftp.log FTP activity password string &log &optional Password for the current FTP session if captured.
ftp.log FTP activity file_size count &log &optional Size of the file if the command indicates a file transfer.
ftp.log FTP activity ts time &log Time when the command was sent.
http.log HTTP requests and replies orig_mime_types vector of string &log &optional (present if base/protocols/http/entities.zeek is loaded) An ordered vector of mime types. Limited to HTTP::max_files_orig entries.
http.log HTTP requests and replies resp_fuids vector of string &log &optional (present if base/protocols/http/entities.zeek is loaded) An ordered vector of file unique IDs. Limited to HTTP::max_files_resp entries.
http.log HTTP requests and replies resp_filenames vector of string &log &optional (present if base/protocols/http/entities.zeek is loaded) An ordered vector of filenames from the server. Limited to HTTP::max_files_resp entries.
http.log HTTP requests and replies resp_mime_types vector of string &log &optional (present if base/protocols/http/entities.zeek is loaded) An ordered vector of mime types. Limited to HTTP::max_files_resp entries.
http.log HTTP requests and replies current_entity HTTP::Entity &optional (present if base/protocols/http/entities.zeek is loaded) The current entity.
http.log HTTP requests and replies orig_mime_depth count &default = 0 &optional (present if base/protocols/http/entities.zeek is loaded) Current number of MIME entities in the HTTP request message body.
http.log HTTP requests and replies resp_mime_depth count &default = 0 &optional (present if base/protocols/http/entities.zeek is loaded) Current number of MIME entities in the HTTP response message body.
http.log HTTP requests and replies user_agent string &log &optional Value of the User-Agent header from the client.
http.log HTTP requests and replies client_header_names vector of string &log &optional (present if policy/protocols/http/header-names.zeek is loaded) The vector of HTTP header names sent by the client. No header values are included here, just the header names.
http.log HTTP requests and replies server_header_names vector of string &log &optional (present if policy/protocols/http/header-names.zeek is loaded) The vector of HTTP header names sent by the server. No header values are included here, just the header names.
http.log HTTP requests and replies omniture bool &default = F &optional (present if policy/protocols/http/software-browser-plugins.zeek is loaded) Indicates if the server is an omniture advertising server.
http.log HTTP requests and replies flash_version string &optional (present if policy/protocols/http/software-browser-plugins.zeek is loaded) The unparsed Flash version, if detected.
http.log HTTP requests and replies cookie_vars vector of string &optional &log (present if policy/protocols/http/var-extraction-cookies.zeek is loaded) Variable names extracted from all cookies.
http.log HTTP requests and replies uri_vars vector of string &optional &log (present if policy/protocols/http/var-extraction-uri.zeek is loaded) Variable names from the URI.
http.log HTTP requests and replies ts time &log Timestamp for when the request happened.
http.log HTTP requests and replies uid string &log Unique ID for the connection.
http.log HTTP requests and replies id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
http.log HTTP requests and replies trans_depth count &log Represents the pipelined depth into the connection of this request/response transaction.
http.log HTTP requests and replies method string &log &optional Verb used in the HTTP request (GET, POST, HEAD, etc.).
http.log HTTP requests and replies host string &log &optional Value of the HOST header.
http.log HTTP requests and replies uri string &log &optional URI used in the request.
http.log HTTP requests and replies referrer string &log &optional Value of the "referer" header. The comment is deliberately misspelled like the standard declares, but the name used here is "referrer" spelled correctly.
http.log HTTP requests and replies version string &log &optional Value of the version portion of the request.
http.log HTTP requests and replies origin string &log &optional Value of the Origin header from the client.
http.log HTTP requests and replies request_body_len count &log &default = 0 &optional Actual uncompressed content size of the data transferred from the client.
http.log HTTP requests and replies response_body_len count &log &default = 0 &optional Actual uncompressed content size of the data transferred from the server.
http.log HTTP requests and replies status_code count &log &optional Status code returned by the server.
http.log HTTP requests and replies status_msg string &log &optional Status message returned by the server.
http.log HTTP requests and replies info_code count &log &optional Last seen 1xx informational reply code returned by the server.
http.log HTTP requests and replies info_msg string &log &optional Last seen 1xx informational reply message returned by the server.
http.log HTTP requests and replies tags set [HTTP::Tags] &log A set of indicators of various attributes discovered and related to a particular request/response pair.
http.log HTTP requests and replies username string &log &optional Username if basic-auth is performed for the request.
http.log HTTP requests and replies password string &log &optional Password if basic-auth is performed for the request.
http.log HTTP requests and replies capture_password bool &default = HTTP::default_capture_password &optional Determines if the password will be captured for this request.
http.log HTTP requests and replies proxied set [string] &log &optional All of the headers that may indicate if the request was proxied.
http.log HTTP requests and replies range_request bool &default = F &optional Indicates if this request can assume 206 partial content in response.
http.log HTTP requests and replies orig_fuids vector of string &log &optional (present if base/protocols/http/entities.zeek is loaded) An ordered vector of file unique IDs. Limited to HTTP::max_files_orig entries.
http.log HTTP requests and replies orig_filenames vector of string &log &optional (present if base/protocols/http/entities.zeek is loaded) An ordered vector of filenames from the client. Limited to HTTP::max_files_orig entries.
irc.log IRC commands and responses ts time &log Timestamp when the command was seen.
irc.log IRC commands and responses user string &log &optional Username given for the connection.
irc.log IRC commands and responses value string &log &optional Value for the command given by the client.
irc.log IRC commands and responses command string &log &optional Command given by the client.
irc.log IRC commands and responses uid string &log Unique ID for the connection.
irc.log IRC commands and responses dcc_file_name string &log &optional (present if base/protocols/irc/dcc-send.zeek is loaded) DCC filename requested.
irc.log IRC commands and responses id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
irc.log IRC commands and responses dcc_file_size count &log &optional (present if base/protocols/irc/dcc-send.zeek is loaded) Size of the DCC transfer as indicated by the sender.
irc.log IRC commands and responses addl string &log &optional Any additional data for the command.
irc.log IRC commands and responses dcc_mime_type string &log &optional (present if base/protocols/irc/dcc-send.zeek is loaded) Sniffed mime type of the file.
irc.log IRC commands and responses fuid string &log &optional (present if base/protocols/irc/files.zeek is loaded) File unique ID.
irc.log IRC commands and responses nick string &log &optional Nickname given for the connection.
kerberos.log Kerberos client_cert_subject string &log &optional (present if base/protocols/krb/files.zeek is loaded) Subject of client certificate, if any
kerberos.log Kerberos client_cert_fuid string &log &optional (present if base/protocols/krb/files.zeek is loaded) File unique ID of client cert, if any
kerberos.log Kerberos server_cert_fuid string &log &optional (present if base/protocols/krb/files.zeek is loaded) File unique ID of server cert, if any
kerberos.log Kerberos auth_ticket string &log &optional (present if policy/protocols/krb/ticket-logging.zeek is loaded) Hash of ticket used to authorize request/transaction
kerberos.log Kerberos new_ticket string &log &optional (present if policy/protocols/krb/ticket-logging.zeek is loaded) Hash of ticket returned by the KDC
kerberos.log Kerberos till time &log &optional Ticket valid till
kerberos.log Kerberos uid string &log Unique ID for the connection.
kerberos.log Kerberos from time &log &optional Ticket valid from
kerberos.log Kerberos error_code count &optional Error code
kerberos.log Kerberos success bool &log &optional Request result
kerberos.log Kerberos service string &log &optional Service
kerberos.log Kerberos client string &log &optional Client
kerberos.log Kerberos error_msg string &log &optional Error message
kerberos.log Kerberos request_type string &log &optional Request type - Authentication Service ("AS") or Ticket Granting Service ("TGS")
kerberos.log Kerberos server_cert Files::Info &optional (present if base/protocols/krb/files.zeek is loaded) Server certificate
kerberos.log Kerberos ts time &log Timestamp for when the event happened.
kerberos.log Kerberos cipher string &log &optional Ticket encryption type
kerberos.log Kerberos server_cert_subject string &log &optional (present if base/protocols/krb/files.zeek is loaded) Subject of server certificate, if any
kerberos.log Kerberos forwardable bool &log &optional Forwardable ticket requested
kerberos.log Kerberos renewable bool &log &optional Renewable ticket requested
kerberos.log Kerberos logged bool &default = F &optional We've already logged this
kerberos.log Kerberos client_cert Files::Info &optional (present if base/protocols/krb/files.zeek is loaded) Client certificate
kerberos.log Kerberos id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
modbus.log Modbus commands and responses uid string &log Unique identifier for the connection.
modbus.log Modbus commands and responses id conn_id &log Identifier for the connection.
modbus.log Modbus commands and responses track_address count &default = 0 &optional (present if policy/protocols/modbus/track-memmap.zeek is loaded)
modbus.log Modbus commands and responses exception string &log &optional The exception if the response was a failure.
modbus.log Modbus commands and responses func string &log &optional The name of the function message that was sent.
modbus.log Modbus commands and responses ts time &log Time of the request.
modbus_register_change.log Tracks changes to Modbus holding registers uid string &log Unique ID for the connection.
modbus_register_change.log Tracks changes to Modbus holding registers id conn_id &log Connection ID.
modbus_register_change.log Tracks changes to Modbus holding registers register count &log The device memory offset.
modbus_register_change.log Tracks changes to Modbus holding registers old_val count &log The old value stored in the register.
modbus_register_change.log Tracks changes to Modbus holding registers new_val count &log The new value stored in the register.
modbus_register_change.log Tracks changes to Modbus holding registers delta interval &log The time delta between when the old_val and new_val were seen.
modbus_register_change.log Tracks changes to Modbus holding registers ts time &log Timestamp for the detected register change.
mysql.log MySQL id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
mysql.log MySQL success bool &log &optional Did the server tell us that the command succeeded?
mysql.log MySQL rows count &log &optional The number of affected rows, if any
mysql.log MySQL ts time &log Timestamp for when the event happened.
mysql.log MySQL uid string &log Unique ID for the connection.
mysql.log MySQL response string &log &optional Server message, if any
mysql.log MySQL arg string &log The argument issued to the command
mysql.log MySQL cmd string &log The command that was issued
ntlm.log NT LAN Manager (NTLM) id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
ntlm.log NT LAN Manager (NTLM) success bool &log &optional Indicate whether or not the authentication was successful.
ntlm.log NT LAN Manager (NTLM) server_tree_name string &log &optional Tree name given by the server in a CHALLENGE.
ntlm.log NT LAN Manager (NTLM) ts time &log Timestamp for when the event happened.
ntlm.log NT LAN Manager (NTLM) server_nb_computer_name string &log &optional NetBIOS name given by the server in a CHALLENGE.
ntlm.log NT LAN Manager (NTLM) uid string &log Unique ID for the connection.
ntlm.log NT LAN Manager (NTLM) done bool &default = F &optional Internally used field to indicate if the login attempt has already been logged.
ntlm.log NT LAN Manager (NTLM) domainname string &log &optional Domainname given by the client.
ntlm.log NT LAN Manager (NTLM) hostname string &log &optional Hostname given by the client.
ntlm.log NT LAN Manager (NTLM) username string &log &optional Username given by the client.
ntlm.log NT LAN Manager (NTLM) server_dns_computer_name string &log &optional DNS name given by the server in a CHALLENGE.
ntp.log Network Time Protocol mode count &log The NTP mode being used.
ntp.log Network Time Protocol stratum count &log The stratum (primary server, secondary server, etc.).
ntp.log Network Time Protocol poll interval &log The maximum interval between successive messages.
ntp.log Network Time Protocol precision interval &log The precision of the system clock.
ntp.log Network Time Protocol root_delay interval &log Total round-trip delay to the reference clock.
ntp.log Network Time Protocol root_disp interval &log Total dispersion to the reference clock.
ntp.log Network Time Protocol ref_id string &log For stratum 0, 4 character string used for debugging. For stratum 1, ID assigned to the reference clock by IANA. Above stratum 1, when using IPv4, the IP address of the reference clock. Note that the NTP protocol did not originally specify a large enough field to represent IPv6 addresses, so they use the first four bytes of the MD5 hash of the reference clock's IPv6 address (i.e. an IPv4 address here is not necessarily IPv4).
ntp.log Network Time Protocol ref_time time &log Time when the system clock was last set or correct.
ntp.log Network Time Protocol org_time time &log Time at the client when the request departed for the NTP server.
ntp.log Network Time Protocol rec_time time &log Time at the server when the request arrived from the NTP client.
ntp.log Network Time Protocol xmt_time time &log Time at the server when the response departed for the NTP client.
ntp.log Network Time Protocol num_exts count &default = 0 &optional &log Number of extension fields (which are not currently parsed).
ntp.log Network Time Protocol ts time &log Timestamp for when the event happened.
ntp.log Network Time Protocol uid string &log Unique ID for the connection.
ntp.log Network Time Protocol id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
ntp.log Network Time Protocol version count &log The NTP version number (1, 2, 3, 4).
radius.log RADIUS authentication attempts ts time &log Timestamp for when the event happened.
radius.log RADIUS authentication attempts reply_msg string &log &optional Reply message from the server challenge. This is frequently shown to the user authenticating.
radius.log RADIUS authentication attempts result string &log &optional Successful or failed authentication.
radius.log RADIUS authentication attempts connect_info string &log &optional Connect info, if present.
radius.log RADIUS authentication attempts ttl interval &log &optional The duration between the first request and either the "Access-Accept" message or an error. If the field is empty, it means that either the request or response was not seen.
radius.log RADIUS authentication attempts username string &log &optional The username, if present.
radius.log RADIUS authentication attempts mac string &log &optional MAC address, if present.
radius.log RADIUS authentication attempts framed_addr addr &log &optional The address given to the network access server, if present. This is only a hint from the RADIUS server and the network access server is not required to honor the address.
radius.log RADIUS authentication attempts uid string &log Unique ID for the connection.
radius.log RADIUS authentication attempts id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
radius.log RADIUS authentication attempts logged bool &default = F &optional Whether this has already been logged and can be ignored.
radius.log RADIUS authentication attempts tunnel_client string &log &optional Address (IPv4, IPv6, or FQDN) of the initiator end of the tunnel, if present. This is collected from the Tunnel-Client-Endpoint attribute.
rdp.log RDP result string &log &optional Status result for the connection. It's a mix between RDP negotation failure messages and GCC server create response messages.
rdp.log RDP client_channels vector of string &log &optional The channels requested by the client
rdp.log RDP ssl bool &log &default = F &optional (present if policy/protocols/rdp/indicate_ssl.zeek is loaded) Flag the connection if it was seen over SSL.
rdp.log RDP cert_permanent bool &log &optional Indicates if the provided certificate or certificate chain is permanent or temporary.
rdp.log RDP id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
rdp.log RDP cookie string &log &optional Cookie value used by the client machine. This is typically a username.
rdp.log RDP requested_color_depth string &log &optional The color depth requested by the client in the high_color_depth field.
rdp.log RDP uid string &log Unique ID for the connection.
rdp.log RDP keyboard_layout string &log &optional Keyboard layout (language) of the client machine.
rdp.log RDP client_build string &log &optional RDP client version used by the client machine.
rdp.log RDP client_name string &log &optional Name of the client machine.
rdp.log RDP done bool &default = F &optional Track status of logging RDP connections.
rdp.log RDP analyzer_id count &optional The analyzer ID used for the analyzer instance attached to each connection. It is not used for logging since it's a meaningless arbitrary number.
rdp.log RDP client_dig_product_id string &log &optional Product ID of the client machine.
rdp.log RDP ts time &log Timestamp for when the event happened.
rdp.log RDP desktop_width count &log &optional Desktop width of the client machine.
rdp.log RDP security_protocol string &log &optional Security protocol chosen by the server.
rdp.log RDP encryption_level string &log &optional Encryption level of the connection.
rdp.log RDP encryption_method string &log &optional Encryption method of the connection.
rdp.log RDP cert_type string &log &optional If the connection is being encrypted with native RDP encryption, this is the type of cert being used.
rdp.log RDP cert_count count &log &default = 0 &optional The number of certs seen. X.509 can transfer an entire certificate chain.
rdp.log RDP desktop_height count &log &optional Desktop height of the client machine.
rfb.log Remote Framebuffer (RFB) id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
rfb.log Remote Framebuffer (RFB) ts time &log Timestamp for when the event happened.
rfb.log Remote Framebuffer (RFB) done bool &default = F &optional Internally used value to determine if this connection has already been logged.
rfb.log Remote Framebuffer (RFB) width count &log &optional Width of the screen that is being shared.
rfb.log Remote Framebuffer (RFB) desktop_name string &log &optional Name of the screen that is being shared.
rfb.log Remote Framebuffer (RFB) share_flag bool &log &optional Whether the client has an exclusive or a shared session.
rfb.log Remote Framebuffer (RFB) auth bool &log &optional Whether or not authentication was successful.
rfb.log Remote Framebuffer (RFB) height count &log &optional Height of the screen that is being shared.
rfb.log Remote Framebuffer (RFB) authentication_method string &log &optional Identifier of authentication method used.
rfb.log Remote Framebuffer (RFB) server_minor_version string &log &optional Minor version of the server.
rfb.log Remote Framebuffer (RFB) server_major_version string &log &optional Major version of the server.
rfb.log Remote Framebuffer (RFB) client_minor_version string &log &optional Minor version of the client.
rfb.log Remote Framebuffer (RFB) uid string &log Unique ID for the connection.
rfb.log Remote Framebuffer (RFB) client_major_version string &log &optional Major version of the client.
sip.log SIP method string &log &optional Verb used in the SIP request (INVITE, REGISTER etc.).
sip.log SIP trans_depth count &log Represents the pipelined depth into the connection of this request/response transaction.
sip.log SIP id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
sip.log SIP reply_to string &log &optional Contents of the Reply-To: header
sip.log SIP seq string &log &optional Contents of the CSeq: header from the client
sip.log SIP subject string &log &optional Contents of the Subject: header from the client
sip.log SIP response_to string &log &optional Contents of the response To: header
sip.log SIP response_from string &log &optional Contents of the response From: header Note: The tag= value that's usually appended to the sender is stripped off and not logged.
sip.log SIP request_to string &log &optional Contents of the To: header
sip.log SIP request_path vector of string &log &optional The client message transmission path, as extracted from the headers.
sip.log SIP response_path vector of string &log &optional The server message transmission path, as extracted from the headers.
sip.log SIP user_agent string &log &optional Contents of the User-Agent: header from the client
sip.log SIP status_code count &log &optional Status code returned by the server.
sip.log SIP status_msg string &log &optional Status message returned by the server.
sip.log SIP warning string &log &optional Contents of the Warning: header
sip.log SIP request_body_len count &log &optional Contents of the Content-Length: header from the client
sip.log SIP response_body_len count &log &optional Contents of the Content-Length: header from the server
sip.log SIP content_type string &log &optional Contents of the Content-Type: header from the server
sip.log SIP call_id string &log &optional Contents of the Call-ID: header from the client
sip.log SIP request_from string &log &optional Contents of the request From: header Note: The tag= value that's usually appended to the sender is stripped off and not logged.
sip.log SIP date string &log &optional Contents of the Date: header from the client
sip.log SIP uid string &log Unique ID for the connection.
sip.log SIP ts time &log Timestamp for when the request happened.
sip.log SIP uri string &log &optional URI used in the request.
smb_cmd.log SMB commands version string &log Version of SMB for the command.
smb_cmd.log SMB commands tree string &log &optional If this is related to a tree, this is the tree that was used for the current command.
smb_cmd.log SMB commands tree_service string &log &optional The type of tree (disk share, printer share, named pipe, etc.).
smb_cmd.log SMB commands referenced_file SMB::FileInfo &log &optional If the command referenced a file, store it here.
smb_cmd.log SMB commands command string &log The command sent by the client.
smb_cmd.log SMB commands smb1_offered_dialects string_vec &optional (present if base/protocols/smb/smb1-main.zeek is loaded) Dialects offered by the client.
smb_cmd.log SMB commands smb2_offered_dialects index_vec &optional (present if base/protocols/smb/smb2-main.zeek is loaded) Dialects offered by the client.
smb_cmd.log SMB commands sub_command string &log &optional The subcommand sent by the client, if present.
smb_cmd.log SMB commands argument string &log &optional Command argument sent by the client, if any.
smb_cmd.log SMB commands rtt interval &log &optional Round trip time from the request to the response.
smb_cmd.log SMB commands uid string &log Unique ID of the connection the request was sent over.
smb_cmd.log SMB commands status string &log &optional Server reply to the client's command.
smb_cmd.log SMB commands referenced_tree SMB::TreeInfo &optional If the command referenced a tree, store it here.
smb_cmd.log SMB commands ts time &log &default = 0.0 &optional Timestamp of the command request.
smb_cmd.log SMB commands username string &log &optional Authenticated username, if available.
smb_cmd.log SMB commands id conn_id &log ID of the connection the request was sent over.
smb_files.log SMB files ts time &log &default = 0.0 &optional Time when the file was first discovered.
smb_files.log SMB files path string &log &optional Path pulled from the tree this file was transferred to or from.
smb_files.log SMB files id conn_id &log ID of the connection the file was sent over.
smb_files.log SMB files uid string &log Unique ID of the connection the file was sent over.
smb_files.log SMB files name string &log &optional Filename if one was seen.
smb_files.log SMB files size count &log &default = 0 &optional Total size of the file.
smb_files.log SMB files prev_name string &log &optional If the rename action was seen, this will be the file's previous name.
smb_files.log SMB files times SMB::MACTimes &log &optional Last time this file was modified.
smb_files.log SMB files fid count &optional ID referencing this file.
smb_files.log SMB files uuid string &optional UUID referencing this file if DCE/RPC.
smb_files.log SMB files fuid string &log &optional Unique ID of the file.
smb_files.log SMB files action SMB::Action &log &optional Action this log record represents.
smb_mapping.log SMB trees uid string &log Unique ID of the connection the tree was mapped over.
smb_mapping.log SMB trees native_file_system string &log &optional File system of the tree.
smb_mapping.log SMB trees share_type string &log &default = "DISK" &optional If this is SMB2, a share type will be included. For SMB1, the type of share will be deduced and included as well.
smb_mapping.log SMB trees service string &log &optional The type of resource of the tree (disk share, printer share, named pipe, etc.).
smb_mapping.log SMB trees path string &log &optional Name of the tree path.
smb_mapping.log SMB trees id conn_id &log ID of the connection the tree was mapped over.
smb_mapping.log SMB trees ts time &log &default = 0.0 &optional Time when the tree was mapped.
smtp.log SMTP transactions helo string &log &optional Contents of the Helo header.
smtp.log SMTP transactions trans_depth count &log A count to represent the depth of this message transaction in a single connection where multiple messages were transferred.
smtp.log SMTP transactions id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
smtp.log SMTP transactions uid string &log Unique ID for the connection.
smtp.log SMTP transactions ts time &log Time when the message was first seen.
smtp.log SMTP transactions cc set [string] &log &optional Contents of the CC header.
smtp.log SMTP transactions to set [string] &log &optional Contents of the To header.
smtp.log SMTP transactions from string &log &optional Contents of the From header.
smtp.log SMTP transactions rcptto set [string] &log &optional Email addresses found in the Rcpt header.
smtp.log SMTP transactions subject string &log &optional Contents of the Subject header.
smtp.log SMTP transactions date string &log &optional Contents of the Date header.
smtp.log SMTP transactions first_received string &log &optional Contents of the first Received header.
smtp.log SMTP transactions second_received string &log &optional Contents of the second Received header.
smtp.log SMTP transactions reply_to string &log &optional Contents of the ReplyTo header.
smtp.log SMTP transactions path vector of addr &log &optional The message transmission path, as extracted from the headers.
smtp.log SMTP transactions msg_id string &log &optional Contents of the MsgID header.
smtp.log SMTP transactions in_reply_to string &log &optional Contents of the In-Reply-To header.
smtp.log SMTP transactions is_webmail bool &log &default = F &optional (present if policy/protocols/smtp/software.zeek is loaded) Boolean indicator of if the message was sent through a webmail interface.
smtp.log SMTP transactions x_originating_ip addr &log &optional Contents of the X-Originating-IP header.
smtp.log SMTP transactions mailfrom string &log &optional Email addresses found in the From header.
smtp.log SMTP transactions last_reply string &log &optional The last message that the server sent to the client.
smtp.log SMTP transactions user_agent string &log &optional Value of the User-Agent header from the client.
smtp.log SMTP transactions tls bool &log &default = F &optional Indicates that the connection has switched to using TLS.
smtp.log SMTP transactions process_received_from bool &default = T &optional Indicates if the "Received: from" headers should still be processed.
smtp.log SMTP transactions has_client_activity bool &default = F &optional Indicates if client activity has been seen, but not yet logged.
smtp.log SMTP transactions process_smtp_headers bool &default = T &optional Indicates if the SMTP headers should still be processed.
smtp.log SMTP transactions entity SMTP::Entity &optional (present if base/protocols/smtp/entities.zeek is loaded) The current entity being seen.
smtp.log SMTP transactions fuids vector of string &log &default = [] &optional (present if base/protocols/smtp/files.zeek is loaded) An ordered vector of file unique IDs seen attached to the message.
snmp.log SNMP messages set_requests count &log &default = 0 &optional The number of variable bindings in SetRequest PDUs seen for the session.
snmp.log SNMP messages ts time &log Timestamp of first packet belonging to the SNMP session.
snmp.log SNMP messages version string &log The version of SNMP being used.
snmp.log SNMP messages id conn_id &log The connection's 5-tuple of addresses/ports (ports inherently include transport protocol information)
snmp.log SNMP messages uid string &log The unique ID for the connection.
snmp.log SNMP messages community string &log &optional The community string of the first SNMP packet associated with the session. This is used as part of SNMP's (v1 and v2c) administrative/security framework. See RFC 1157 or RFC 1901.
snmp.log SNMP messages duration interval &log &default = 0 secs &optional The amount of time between the first packet beloning to the SNMP session and the latest one seen.
snmp.log SNMP messages up_since time &log &optional The time at which the SNMP responder endpoint claims it's been up since.
snmp.log SNMP messages display_string string &log &optional A system description of the SNMP responder endpoint.
snmp.log SNMP messages get_requests count &log &default = 0 &optional The number of variable bindings in GetRequest/GetNextRequest PDUs seen for the session.
snmp.log SNMP messages get_responses count &log &default = 0 &optional The number of variable bindings in GetResponse/Response PDUs seen for the session.
snmp.log SNMP messages get_bulk_requests count &log &default = 0 &optional The number of variable bindings in GetBulkRequest PDUs seen for the session.
socks.log SOCKS proxy requests bound_p port &log &optional Server bound port.
socks.log SOCKS proxy requests bound SOCKS::Address &log &optional Server bound address. Could be an address, a name or both.
socks.log SOCKS proxy requests request_p port &log &optional Client requested port.
socks.log SOCKS proxy requests uid string &log Unique ID for the tunnel - may correspond to connection uid or be non-existent.
socks.log SOCKS proxy requests request SOCKS::Address &log &optional Client requested SOCKS address. Could be an address, a name or both.
socks.log SOCKS proxy requests ts time &log Time when the proxy connection was first detected.
socks.log SOCKS proxy requests id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
socks.log SOCKS proxy requests version count &log Protocol version of SOCKS.
socks.log SOCKS proxy requests user string &log &optional Username used to request a login to the proxy.
socks.log SOCKS proxy requests password string &log &optional Password used to request a login to the proxy.
socks.log SOCKS proxy requests capture_password bool &default = SOCKS::default_capture_password &optional Determines if the password will be captured for this request.
socks.log SOCKS proxy requests status string &log &optional Server status for the attempt at using the proxy.
ssh.log SSH connections server string &log &optional The server's version string
ssh.log SSH connections cipher_alg string &log &optional The encryption algorithm in use
ssh.log SSH connections mac_alg string &log &optional The signing (MAC) algorithm in use
ssh.log SSH connections compression_alg string &log &optional The compression algorithm in use
ssh.log SSH connections kex_alg string &log &optional The key exchange algorithm in use
ssh.log SSH connections ts time &log Time when the SSH connection began.
ssh.log SSH connections host_key_alg string &log &optional The server host key's algorithm
ssh.log SSH connections host_key string &log &optional The server's key fingerprint
ssh.log SSH connections analyzer_id count &optional Analzyer ID
ssh.log SSH connections remote_location geo_location &log &optional (present if policy/protocols/ssh/geo-data.zeek is loaded) Add geographic data related to the "remote" host of the connection.
ssh.log SSH connections client string &log &optional The client's version string
ssh.log SSH connections id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
ssh.log SSH connections auth_success bool &log &optional Authentication result (T=success, F=failure, unset=unknown)
ssh.log SSH connections version count &log SSH major version (1 or 2)
ssh.log SSH connections direction Direction &log &optional Direction of the connection. If the client was a local host logging into an external host, this would be OUTBOUND. INBOUND would be set for the opposite situation.
ssh.log SSH connections auth_attempts count &log &default = 0 &optional The number of authentication attemps we observed. There's always at least one, since some servers might support no authentication at all. It's important to note that not all of these are failures, since some servers require two-factor auth (e.g. password AND pubkey)
ssh.log SSH connections uid string &log Unique ID for the connection.
ssl.log SSL/TLS handshake info curve string &log &optional Elliptic curve the server chose when using ECDH/ECDHE.
ssl.log SSL/TLS handshake info server_name string &log &optional Value of the Server Name Indicator SSL/TLS extension. It indicates the server name that the client was requesting.
ssl.log SSL/TLS handshake info ts time &log Time when the SSL connection was first detected.
ssl.log SSL/TLS handshake info uid string &log Unique ID for the connection.
ssl.log SSL/TLS handshake info id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
ssl.log SSL/TLS handshake info version_num count &optional Numeric SSL/TLS version that the server chose.
ssl.log SSL/TLS handshake info version string &log &optional SSL/TLS version that the server chose.
ssl.log SSL/TLS handshake info session_id string &optional Session ID offered by the client for session resumption. Not used for logging.
ssl.log SSL/TLS handshake info resumed bool &log &default = F &optional Flag to indicate if the session was resumed reusing the key material exchanged in an earlier connection.
ssl.log SSL/TLS handshake info client_ticket_empty_session_seen bool &default = F &optional Flag to indicate if we saw a non-empty session ticket being sent by the client using an empty session ID. This value is used to determine if a session is being resumed. It's not logged.
ssl.log SSL/TLS handshake info logged bool &default = F &optional Flag to indicate if this record already has been logged, to prevent duplicates.
ssl.log SSL/TLS handshake info cert_chain vector of Files::Info &optional (present if base/protocols/ssl/files.zeek is loaded) Chain of certificates offered by the server to validate its complete signing chain.
ssl.log SSL/TLS handshake info cert_chain_fuids vector of string &optional &log (present if base/protocols/ssl/files.zeek is loaded) An ordered vector of all certificate file unique IDs for the certificates offered by the server.
ssl.log SSL/TLS handshake info client_cert_chain vector of Files::Info &optional (present if base/protocols/ssl/files.zeek is loaded) Chain of certificates offered by the client to validate its complete signing chain.
ssl.log SSL/TLS handshake info client_key_exchange_seen bool &default = F &optional Flag to indicate if we saw a client key exchange message sent by the client. This value is used to determine if a session is being resumed. It's not logged.
ssl.log SSL/TLS handshake info client_psk_seen bool &default = F &optional Track if the client sent a pre-shared-key extension. Used to determine if a TLS 1.3 session is being resumed. Not logged.
ssl.log SSL/TLS handshake info cipher string &log &optional SSL/TLS cipher suite that the server chose.
ssl.log SSL/TLS handshake info last_alert string &log &optional Last alert that was seen during the connection.
ssl.log SSL/TLS handshake info next_protocol string &log &optional Next protocol the server chose using the application layer next protocol extension, if present.
ssl.log SSL/TLS handshake info client_cert_chain_fuids vector of string &optional &log (present if base/protocols/ssl/files.zeek is loaded) An ordered vector of all certificate file unique IDs for the certificates offered by the client.
ssl.log SSL/TLS handshake info subject string &log &optional (present if base/protocols/ssl/files.zeek is loaded) Subject of the X.509 certificate offered by the server.
ssl.log SSL/TLS handshake info issuer string &log &optional (present if base/protocols/ssl/files.zeek is loaded) Subject of the signer of the X.509 certificate offered by the server.
ssl.log SSL/TLS handshake info client_subject string &log &optional (present if base/protocols/ssl/files.zeek is loaded) Subject of the X.509 certificate offered by the client.
ssl.log SSL/TLS handshake info analyzer_id count &optional The analyzer ID used for the analyzer instance attached to each connection. It is not used for logging since it's a meaningless arbitrary number.
ssl.log SSL/TLS handshake info established bool &log &default = F &optional Flag to indicate if this ssl session has been established successfully, or if it was aborted during the handshake.
ssl.log SSL/TLS handshake info notary CertNotary::Response &log &optional (present if policy/protocols/ssl/notary.zeek is loaded) A response from the ICSI certificate notary.
ssl.log SSL/TLS handshake info client_issuer string &log &optional (present if base/protocols/ssl/files.zeek is loaded) Subject of the signer of the X.509 certificate offered by the client.
ssl.log SSL/TLS handshake info server_depth count &default = 0 &optional (present if base/protocols/ssl/files.zeek is loaded) Current number of certificates seen from either side. Used to create file handles.
ssl.log SSL/TLS handshake info client_depth count &default = 0 &optional (present if base/protocols/ssl/files.zeek is loaded)
ssl.log SSL/TLS handshake info last_originator_heartbeat_request_size count &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info last_responder_heartbeat_request_size count &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info originator_heartbeats count &default = 0 &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info responder_heartbeats count &default = 0 &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info heartbleed_detected bool &default = F &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info enc_appdata_packages count &default = 0 &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info enc_appdata_bytes count &default = 0 &optional (present if policy/protocols/ssl/heartbleed.zeek is loaded)
ssl.log SSL/TLS handshake info validation_status string &log &optional (present if policy/protocols/ssl/validate-certs.zeek is loaded) Result of certificate validation for this connection.
ssl.log SSL/TLS handshake info validation_code int &optional (present if policy/protocols/ssl/validate-certs.zeek is loaded) Result of certificate validation for this connection, given as OpenSSL validation code.
ssl.log SSL/TLS handshake info valid_chain vector of opaque of x509 &optional (present if policy/protocols/ssl/validate-certs.zeek is loaded) Ordered chain of validated certificate, if validation succeeded.
ssl.log SSL/TLS handshake info ocsp_status string &log &optional (present if policy/protocols/ssl/validate-ocsp.zeek is loaded) Result of ocsp validation for this connection.
ssl.log SSL/TLS handshake info ocsp_response string &optional (present if policy/protocols/ssl/validate-ocsp.zeek is loaded) ocsp response as string.
ssl.log SSL/TLS handshake info valid_scts count &optional (present if policy/protocols/ssl/validate-sct.zeek is loaded) Number of valid SCTs that were encountered in the connection.
ssl.log SSL/TLS handshake info invalid_scts count &optional (present if policy/protocols/ssl/validate-sct.zeek is loaded) Number of SCTs that could not be validated that were encountered in the connection.
ssl.log SSL/TLS handshake info valid_ct_logs count &log &optional (present if policy/protocols/ssl/validate-sct.zeek is loaded) Number of different Logs for which valid SCTs were encountered in the connection.
ssl.log SSL/TLS handshake info valid_ct_operators count &log &optional (present if policy/protocols/ssl/validate-sct.zeek is loaded) Number of different Log operators of which valid SCTs were encountered in the connection.
ssl.log SSL/TLS handshake info valid_ct_operators_list set [string] &optional (present if policy/protocols/ssl/validate-sct.zeek is loaded) List of operators for which valid SCTs were encountered in the connection.
ssl.log SSL/TLS handshake info ct_proofs vector of SSL::SctInfo &default = [] &optional (present if policy/protocols/ssl/validate-sct.zeek is loaded) Information about all SCTs that were encountered in the connection.
syslog.log Syslog messages message string &log The plain text message.
syslog.log Syslog messages facility string &log Syslog facility for the message.
syslog.log Syslog messages severity string &log Syslog severity for the message.
syslog.log Syslog messages ts time &log Timestamp when the syslog message was seen.
syslog.log Syslog messages uid string &log Unique ID for the connection.
syslog.log Syslog messages id conn_id &log The connection's 4-tuple of endpoint addresses/ports.
syslog.log Syslog messages proto transport_proto &log Protocol over which the message was seen.
tunnel.log Tunneling protocol events id conn_id &log The tunnel "connection" 4-tuple of endpoint addresses/ports. For an IP tunnel, the ports will be 0.
tunnel.log Tunneling protocol events uid string &log &optional The unique identifier for the tunnel, which may correspond to a connection's uid field for non-IP-in-IP tunnels. This is optional because there could be numerous connections for payload proxies like SOCKS but we should treat it as a single tunnel.
tunnel.log Tunneling protocol events ts time &log Time at which some tunnel activity occurred.
tunnel.log Tunneling protocol events tunnel_type Tunnel::Type &log The type of tunnel.
tunnel.log Tunneling protocol events action Tunnel::Action &log The type of activity that occurred.

Files

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
files.log File analysis results x509 X509::Info &optional (present if base/files/x509/main.zeek is loaded) Information about X509 certificates. This is used to keep certificate information until all events have been received.
files.log File analysis results extracted string &optional &log (present if base/files/extract/main.zeek is loaded) Local filename of extracted file.
files.log File analysis results extracted_size count &optional &log (present if base/files/extract/main.zeek is loaded) The number of bytes extracted to disk.
files.log File analysis results entropy double &log &optional (present if policy/frameworks/files/entropy-test-all-files.zeek is loaded) The information density of the contents of the file, expressed as a number of bits per character.
files.log File analysis results seen_bytes count &log &default = 0 &optional Number of bytes provided to the file analysis engine for the file.
files.log File analysis results total_bytes count &log &optional Total number of bytes that are supposed to comprise the full file.
files.log File analysis results depth count &default = 0 &optional &log A value to represent the depth of this file in relation to its source. In SMTP, it is the depth of the MIME attachment on the message. In HTTP, it is the depth of the request within the TCP connection.
files.log File analysis results filename string &log &optional A filename for the file if one is available from the source for the file. These will frequently come from "Content-Disposition" headers in network protocols.
files.log File analysis results mime_type string &log &optional A mime type provided by the strongest file magic signature match against the bof_buffer field of fa_file, or in the cases where no buffering of the beginning of file occurs, an initial guess of the mime type based on the first data seen.
files.log File analysis results analyzers set [string] &default = {  } &optional &log A set of analysis types done during the file analysis.
files.log File analysis results missing_bytes count &log &default = 0 &optional The number of bytes in the file stream that were completely missed during the process of analysis e.g. due to dropped packets.
files.log File analysis results source string &log &optional An identification of the source of the file data. E.g. it may be a network protocol over which it was transferred, or a local file path which was read, or some other input source.
files.log File analysis results conn_uids set [string] &default = {  } &optional &log Connection UIDs over which the file was transferred.
files.log File analysis results timedout bool &log &default = F &optional Whether the file analysis timed out at least once for the file.
files.log File analysis results duration interval &log &default = 0 secs &optional The duration the file was analyzed for.
files.log File analysis results parent_fuid string &log &optional Identifier associated with a container file from which this one was extracted as part of the file analysis.
files.log File analysis results md5 string &log &optional (present if base/files/hash/main.zeek is loaded) An MD5 digest of the file contents.
files.log File analysis results sha1 string &log &optional (present if base/files/hash/main.zeek is loaded) A SHA1 digest of the file contents.
files.log File analysis results sha256 string &log &optional (present if base/files/hash/main.zeek is loaded) A SHA256 digest of the file contents.
files.log File analysis results extracted_cutoff bool &optional &log (present if base/files/extract/main.zeek is loaded) Set to true if the file being extracted was cut off so the whole file was not logged.
files.log File analysis results local_orig bool &log &optional If the source of this file is a network connection, this field indicates if the data originated from the local network or not as determined by the configured Site::local_nets.
files.log File analysis results rx_hosts set [addr] &default = {  } &optional &log If this file was transferred over a network connection this should show the host or hosts that the data traveled to.
files.log File analysis results tx_hosts set [addr] &default = {  } &optional &log If this file was transferred over a network connection this should show the host or hosts that the data sourced from.
files.log File analysis results fuid string &log An identifier associated with a single file.
files.log File analysis results ts time &log The time when the file was first seen.
files.log File analysis results is_orig bool &log &optional If the source of this file is a network connection, this field indicates if the file is being sent by the originator of the connection or the responder.
files.log File analysis results overflow_bytes count &log &default = 0 &optional The number of bytes in the file stream that were not delivered to stream file analyzers. This could be overlapping bytes or bytes that couldn't be reassembled.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. revoketime time &log &optional Time at which the certificate was revoked.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. serialNumber string &log Serial number of the affected certificate.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. issuerKeyHash string &log Hash of the issuer's public key.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. issuerNameHash string &log Hash of the issuer's distingueshed name.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. hashAlgorithm string &log Hash algorithm used to generate issuerNameHash and issuerKeyHash.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. id string &log File id of the OCSP reply.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. ts time &log Time when the OCSP reply was encountered.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. nextUpdate time &log &optional The latest time at which new information about the status of the certificate will be available.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. thisUpdate time &log The time at which the status being shows is known to have been correct.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. revokereason string &log &optional Reason for which the certificate was revoked.
ocsp.log Online Certificate Status Protocol (OCSP). Only created if policy script is loaded. certStatus string &log Status of the affected certificate.
pe.log Portable Executable (PE) has_cert_table bool &log &optional Does the file have an attribute certificate table?
pe.log Portable Executable (PE) has_export_table bool &log &optional Does the file have an export table?
pe.log Portable Executable (PE) has_import_table bool &log &optional Does the file have an import table?
pe.log Portable Executable (PE) is_exe bool &log &default = T &optional Is the file an executable, or just an object file?
pe.log Portable Executable (PE) subsystem string &log &optional The subsystem that is required to run this file.
pe.log Portable Executable (PE) os string &log &optional The required operating system.
pe.log Portable Executable (PE) compile_ts time &log &optional The time that the file was created at.
pe.log Portable Executable (PE) section_names vector of string &log &optional The names of the sections, in order.
pe.log Portable Executable (PE) machine string &log &optional The target machine that the file was compiled for.
pe.log Portable Executable (PE) has_debug_data bool &log &optional Does the file have a debug table?
pe.log Portable Executable (PE) is_64bit bool &log &default = T &optional Is the file a 64-bit executable?
pe.log Portable Executable (PE) ts time &log Current timestamp.
pe.log Portable Executable (PE) id string &log File id of this portable executable file.
pe.log Portable Executable (PE) uses_seh bool &log &default = T &optional Does the file use structured exception handing?
pe.log Portable Executable (PE) uses_code_integrity bool &log &default = F &optional Does the file enforce code integrity checks?
pe.log Portable Executable (PE) uses_dep bool &log &default = F &optional Does the file support Data Execution Prevention?
pe.log Portable Executable (PE) uses_aslr bool &log &default = F &optional Does the file support Address Space Layout Randomization?
x509.log X.509 certificate info extensions_cache vector of any &default = [] &optional All extensions in the order they were raised. This is used for caching certificates that are commonly encountered and should not be relied on in user scripts.
x509.log X.509 certificate info logcert bool &default = T &optional (present if policy/protocols/ssl/log-hostcerts-only.zeek is loaded) Logging of certificate is suppressed if set to F
x509.log X.509 certificate info san X509::SubjectAlternativeName &optional &log Subject alternative name extension of the certificate.
x509.log X.509 certificate info extensions vector of X509::Extension &default = [] &optional All extensions that were encountered in the certificate.
x509.log X.509 certificate info handle opaque of x509 The opaque wrapping the certificate. Mainly used for the verify operations.
x509.log X.509 certificate info certificate X509::Certificate &log Basic information about the certificate.
x509.log X.509 certificate info id string &log File id of this certificate.
x509.log X.509 certificate info ts time &log Current timestamp.
x509.log X.509 certificate info basic_constraints X509::BasicConstraints &optional &log Basic constraints extension of the certificate.

Detection

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
intel.log Intelligence data matches file_mime_type string &log &optional (present if base/frameworks/intel/files.zeek is loaded) A mime type if the intelligence hit is related to a file. If the $f field is provided this will be automatically filled out.
intel.log Intelligence data matches id conn_id &log &optional If a connection was associated with this intelligence hit, this is the conn_id for the connection.
intel.log Intelligence data matches seen Intel::Seen &log Where the data was seen.
intel.log Intelligence data matches file_desc string &log &optional (present if base/frameworks/intel/files.zeek is loaded) Frequently files can be "described" to give a bit more context. If the $f field is provided this field will be automatically filled out.
intel.log Intelligence data matches fuid string &log &optional (present if base/frameworks/intel/files.zeek is loaded) If a file was associated with this intelligence hit, this is the uid for the file.
intel.log Intelligence data matches matched Intel::TypeSet &log Which indicator types matched.
intel.log Intelligence data matches sources set [string] &log &default = {  } &optional Sources which supplied data that resulted in this match.
intel.log Intelligence data matches cif Intel::CIF &log &optional (present if policy/integration/collective-intel/main.zeek is loaded)
intel.log Intelligence data matches ts time &log Timestamp when the data was discovered.
intel.log Intelligence data matches uid string &log &optional If a connection was associated with this intelligence hit, this is the uid for the connection
notice_alarm.log The alarm stream remote_location geo_location &log &optional (present if base/frameworks/notice/actions/add-geodata.zeek is loaded) If GeoIP support is built in, notices can have geographic information attached to them.
notice_alarm.log The alarm stream p port &log &optional Associated port, if we don't have a conn_id.
notice_alarm.log The alarm stream fuid string &log &optional A file unique ID if this notice is related to a file. If the f field is provided, this will be automatically filled out.
notice_alarm.log The alarm stream src addr &log &optional Source address, if we don't have a conn_id.
notice_alarm.log The alarm stream file_desc string &log &optional Frequently files can be "described" to give a bit more context. This field will typically be automatically filled out from an fa_file record. For example, if a notice was related to a file over HTTP, the URL of the request would be shown.
notice_alarm.log The alarm stream proto transport_proto &log &optional The transport protocol. Filled automatically when either conn, iconn or p is specified.
notice_alarm.log The alarm stream dst addr &log &optional Destination address.
notice_alarm.log The alarm stream dropped bool &log &default = F &optional (present if policy/frameworks/notice/actions/drop.zeek is loaded) Indicate if the $src IP address was dropped and denied network access.
notice_alarm.log The alarm stream email_delay_tokens set [string] &optional Adding a string "token" to this set will cause the notice framework's built-in emailing functionality to delay sending the email until either the token has been removed or the email has been delayed for Notice::max_email_delay.
notice_alarm.log The alarm stream email_body_sections vector of string &optional By adding chunks of text into this element, other scripts can expand on notices that are being emailed. The normal way to add text is to extend the vector by handling the Notice::notice event and modifying the notice in place.
notice_alarm.log The alarm stream actions Notice::ActionSet &log &default = {  } &optional The actions which have been applied to this notice.
notice_alarm.log The alarm stream note Notice::Type &log The Notice::Type of the notice.
notice_alarm.log The alarm stream msg string &log &optional The human readable message for the notice.
notice_alarm.log The alarm stream peer_name string &optional Name of remote peer that raised this notice.
notice_alarm.log The alarm stream n count &log &optional Associated count, or perhaps a status code.
notice_alarm.log The alarm stream file_mime_type string &log &optional A mime type if the notice is related to a file. If the f field is provided, this will be automatically filled out.
notice_alarm.log The alarm stream ts time &log &optional An absolute time indicating when the notice occurred, defaults to the current network time.
notice_alarm.log The alarm stream f fa_file &optional A file record if the notice is related to a file. The reference to the actual fa_file record will be deleted after applying the notice policy.
notice_alarm.log The alarm stream iconn icmp_conn &optional A shorthand way of giving the uid and id to a notice. The reference to the actual connection will be deleted after applying the notice policy.
notice_alarm.log The alarm stream conn connection &optional A shorthand way of giving the uid and id to a notice. The reference to the actual connection will be deleted after applying the notice policy.
notice_alarm.log The alarm stream id conn_id &log &optional A connection 4-tuple identifying the endpoints concerned with the notice.
notice_alarm.log The alarm stream uid string &log &optional A connection UID which uniquely identifies the endpoints concerned with the notice.
notice_alarm.log The alarm stream sub string &log &optional The human readable sub-message.
notice_alarm.log The alarm stream identifier string &optional This field is to be provided when a notice is generated for the purpose of deduplicating notices. The identifier string should be unique for a single instance of the notice. This field should be filled out in almost all cases when generating notices to define when a notice is conceptually a duplicate of a previous notice. For example, an SSL certificate that is going to expire soon should always have the same identifier no matter the client IP address that connected and resulted in the certificate being exposed. In this case, the resp_h, resp_p, and hash of the certificate would be used to create this value. The hash of the cert is included because servers can return multiple certificates on the same port. Another example might be a host downloading a file which triggered a notice because the MD5 sum of the file it downloaded was known by some set of intelligence. In that case, the orig_h (client) and MD5 sum would be used in this field to dedup because if the same file is downloaded over and over again you really only want to know about it a single time. This makes it possible to send those notices to email without worrying so much about sending thousands of emails.
notice_alarm.log The alarm stream suppress_for interval &log &default = Notice::default_suppression_interval &optional This field indicates the length of time that this unique notice should be suppressed.
notice_alarm.log The alarm stream peer_descr string &log &optional Textual description for the peer that raised this notice, including name, host address and port.
signatures.log Signature matches ts time &log The network time at which a signature matching type of event to be logged has occurred.
signatures.log Signature matches src_addr addr &log &optional The host which triggered the signature match event.
signatures.log Signature matches src_port port &log &optional The host port on which the signature-matching activity occurred.
signatures.log Signature matches dst_addr addr &log &optional The destination host which was sent the payload that triggered the signature match.
signatures.log Signature matches dst_port port &log &optional The destination host port which was sent the payload that triggered the signature match.
signatures.log Signature matches note Notice::Type &log Notice associated with signature event.
signatures.log Signature matches sig_id string &log &optional The name of the signature that matched.
signatures.log Signature matches event_msg string &log &optional A more descriptive message of the signature-matching event.
signatures.log Signature matches sig_count count &log &optional Number of sigs, usually from summary count.
signatures.log Signature matches host_count count &log &optional Number of hosts, from a summary count.
signatures.log Signature matches uid string &log &optional A unique identifier of the connection which triggered the signature match event.
signatures.log Signature matches sub_msg string &log &optional Extracted payload data or extra message.
traceroute.log Traceroute detection src addr &log Address initiating the traceroute.
traceroute.log Traceroute detection proto string &log Protocol used for the traceroute.
traceroute.log Traceroute detection dst addr &log Destination address of the traceroute.
traceroute.log Traceroute detection ts time &log Timestamp

Miscellaneous

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
barnyard2.log Alerts received from Barnyard2 alert Barnyard2::AlertData &log Associated alert data.
barnyard2.log Alerts received from Barnyard2 pid Barnyard2::PacketID &log Associated packet ID.
barnyard2.log Alerts received from Barnyard2 ts time &log Timestamp of the alert.
dpd.log Dynamic protocol detection failures uid string &log Connection unique ID.
dpd.log Dynamic protocol detection failures ts time &log Timestamp for when protocol analysis failed.
dpd.log Dynamic protocol detection failures packet_segment string &optional &log (present if policy/frameworks/dpd/packet-segment-logging.zeek is loaded) A chunk of the payload that most likely resulted in the protocol violation.
dpd.log Dynamic protocol detection failures analyzer string &log The analyzer that generated the violation.
dpd.log Dynamic protocol detection failures failure_reason string &log The textual reason for the analysis failure.
dpd.log Dynamic protocol detection failures proto transport_proto &log Transport protocol for the violation.
dpd.log Dynamic protocol detection failures id conn_id &log Connection ID containing the 4-tuple which identifies endpoints.
unified2.log Interprets Snort's unified output signature_revision count &log Sig revision for this id.
unified2.log Interprets Snort's unified output generator string &optional &log A string representation of the generator_id field if a gen_msg.map file was loaded.
unified2.log Interprets Snort's unified output sensor_id count &log Sensor that originated this event.
unified2.log Interprets Snort's unified output generator_id count &log Which generator generated the alert?
unified2.log Interprets Snort's unified output signature string &optional &log A string representation of the signature_id field if a sid_msg.map file was loaded.
unified2.log Interprets Snort's unified output signature_id count &log Sig id for this generator.
unified2.log Interprets Snort's unified output priority_id count &log Event priority.
unified2.log Interprets Snort's unified output event_id count &log Event ID.
unified2.log Interprets Snort's unified output packet string &optional &log Some of the packet data.
unified2.log Interprets Snort's unified output classification_id count &log Event classification.
unified2.log Interprets Snort's unified output classification string &optional &log Descriptive classification string.
unified2.log Interprets Snort's unified output id Unified2::PacketID &log Addresses and ports for the connection.
unified2.log Interprets Snort's unified output ts time &log Timestamp attached to the alert.
unknown_protocols.log Information about packet protocols that Zeek doesn't know how to process first_bytes string &log A certain number of bytes at the start of the unknown protocol's header.
unknown_protocols.log Information about packet protocols that Zeek doesn't know how to process protocol_id string &log The identifier of the protocol being forwarded.
unknown_protocols.log Information about packet protocols that Zeek doesn't know how to process analyzer string &log The string name of the analyzer attempting to forward the protocol.
unknown_protocols.log Information about packet protocols that Zeek doesn't know how to process ts time &log Timestamp for when the measurement occurred.
weird.log Unexpected network-level activity peer string &log &optional &default = peer_description The peer that originated this weird. This is helpful in cluster deployments if a particular cluster node is having trouble to help identify which node is having trouble.
weird.log Unexpected network-level activity addl string &log &optional Additional information accompanying the weird if any.
weird.log Unexpected network-level activity notice bool &log &default = F &optional Indicate if this weird was also turned into a notice.
weird.log Unexpected network-level activity ts time &log The time when the weird occurred.
weird.log Unexpected network-level activity uid string &log &optional If a connection is associated with this weird, this will be the connection's unique ID.
weird.log Unexpected network-level activity identifier string &optional This field is to be provided when a weird is generated for the purpose of deduplicating weirds. The identifier string should be unique for a single instance of the weird. This field is used to define when a weird is conceptually a duplicate of a previous weird.
weird.log Unexpected network-level activity id conn_id &log &optional conn_id for the optional connection.
weird.log Unexpected network-level activity source string &log &optional The source of the weird. When reported by an analyzer, this should be the name of the analyzer.
weird.log Unexpected network-level activity name string &log The name of the weird that occurred.
weird.log Unexpected network-level activity conn connection &optional A shorthand way of giving the uid and id to a weird.
weird_stats.log Statistics about unexpected activity num_seen count &log Number of times weird was seen since the last stats interval.
weird_stats.log Statistics about unexpected activity ts time &log Timestamp for the measurement.
weird_stats.log Statistics about unexpected activity name string &log Name of the weird.

NetControl

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
netcontrol.log NetControl actions action string &log &optional String describing an action the entry is about.
netcontrol.log NetControl actions category NetControl::InfoCategory &log &optional Type of the log entry.
netcontrol.log NetControl actions rule_id string &log &optional ID of the rule; unique during each Zeek run.
netcontrol.log NetControl actions expire interval &log &optional Expiry time of the log entry.
netcontrol.log NetControl actions priority int &log &optional Number describing the priority of the log entry.
netcontrol.log NetControl actions msg string &log &optional String with an additional message.
netcontrol.log NetControl actions mod string &log &optional String describing the optional modification of the entry (e.h. redirect)
netcontrol.log NetControl actions state NetControl::InfoState &log &optional State the log entry reflects.
netcontrol.log NetControl actions plugin string &log &optional Plugin triggering the log entry.
netcontrol.log NetControl actions location string &log &optional Location where the underlying action was triggered.
netcontrol.log NetControl actions ts time &log Time at which the recorded activity occurred.
netcontrol.log NetControl actions target NetControl::TargetType &log &optional The target type of the action.
netcontrol.log NetControl actions entity_type string &log &optional Type of the entity the log entry is about.
netcontrol.log NetControl actions entity string &log &optional String describing the entity the log entry is about.
netcontrol.log NetControl actions cmd string &log &optional The command the log entry is about.
netcontrol_catch_release.log NetControl catch and release actions watch_interval interval &log &optional The current watch_interval (for how long the address will be watched and re-block if it reappears).
netcontrol_catch_release.log NetControl catch and release actions block_interval interval &log &optional The current block_interaval (for how long the address is blocked).
netcontrol_catch_release.log NetControl catch and release actions action NetControl::CatchReleaseActions &log The action that was taken in this log-line.
netcontrol_catch_release.log NetControl catch and release actions ip addr &log The IP address that this line refers to.
netcontrol_catch_release.log NetControl catch and release actions message string &log &optional Additional informational string by the catch and release framework about this log-line.
netcontrol_catch_release.log NetControl catch and release actions location string &log &optional The user specified location string.
netcontrol_catch_release.log NetControl catch and release actions blocked_until time &log &optional The absolute time until which the address is blocked.
netcontrol_catch_release.log NetControl catch and release actions watched_until time &log &optional The absolute time until which the address will be monitored.
netcontrol_catch_release.log NetControl catch and release actions num_blocked count &log &optional Number of times that this address was blocked in the current cycle.
netcontrol_catch_release.log NetControl catch and release actions rule_id string &log &optional The rule id that this log line refers to.
netcontrol_catch_release.log NetControl catch and release actions ts time &log The absolute time indicating when the action for this log-line occured.
netcontrol_drop.log NetControl actions resp_p port &log &optional The responder's port number.
netcontrol_drop.log NetControl actions ts time &log Time at which the recorded activity occurred.
netcontrol_drop.log NetControl actions rule_id string &log ID of the rule; unique during each Zeek run.
netcontrol_drop.log NetControl actions orig_h addr &log The originator's IP address.
netcontrol_drop.log NetControl actions orig_p port &log &optional The originator's port number.
netcontrol_drop.log NetControl actions resp_h addr &log &optional The responder's IP address.
netcontrol_drop.log NetControl actions expire interval &log Expiry time of the shunt.
netcontrol_drop.log NetControl actions location string &log &optional Location where the underlying action was triggered.
netcontrol_shunt.log NetControl shunt actions rule_id string &log ID of the rule; unique during each Zeek run.
netcontrol_shunt.log NetControl shunt actions location string &log &optional Location where the underlying action was triggered.
netcontrol_shunt.log NetControl shunt actions ts time &log Time at which the recorded activity occurred.
netcontrol_shunt.log NetControl shunt actions expire interval &log Expiry time of the shunt.
netcontrol_shunt.log NetControl shunt actions f flow_id &log Flow ID of the shunted flow.
openflow.log OpenFlow debug log ts time &log Network time.
openflow.log OpenFlow debug log flow_mod OpenFlow::ofp_flow_mod &log OpenFlow modify flow entry message.
openflow.log OpenFlow debug log match OpenFlow::ofp_match &log OpenFlow match fields.
openflow.log OpenFlow debug log dpid count &log OpenFlow switch datapath id.

Network Observation

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
known_certs.log SSL certificates port_num port &log &optional If the certificate was handed out by a server, this is the port that the server was listening on.
known_certs.log SSL certificates host addr &log The address that offered the certificate.
known_certs.log SSL certificates subject string &log &optional Certificate subject.
known_certs.log SSL certificates issuer_subject string &log &optional Certificate issuer subject.
known_certs.log SSL certificates serial string &log &optional Serial number for the certificate.
known_certs.log SSL certificates ts time &log The timestamp when the certificate was detected.
known_hosts.log Hosts that have completed TCP handshakes host addr &log The address that was detected originating or responding to a TCP connection.
known_hosts.log Hosts that have completed TCP handshakes ts time &log The timestamp at which the host was detected.
known_modbus.log Modbus masters and slaves ts time &log The time the device was discovered.
known_modbus.log Modbus masters and slaves device_type Known::ModbusDeviceType &log The type of device being tracked.
known_modbus.log Modbus masters and slaves host addr &log The IP address of the host.
known_services.log Services running on hosts service set [string] &log A set of protocols that match the service's connection payloads.
known_services.log Services running on hosts host addr &log The host address on which the service is running.
known_services.log Services running on hosts port_num port &log The port number on which the service is running.
known_services.log Services running on hosts port_proto transport_proto &log The transport-layer protocol which the service uses.
known_services.log Services running on hosts ts time &log The time at which the service was detected.
software.log Software being used on the network name string &log &optional Name of the software (e.g. Apache).
software.log Software being used on the network software_type Software::Type &log &default = Software::UNKNOWN &optional The type of software detected (e.g. HTTP::SERVER).
software.log Software being used on the network ts time &log &optional The time at which the software was detected.
software.log Software being used on the network host addr &log The IP address detected running the software.
software.log Software being used on the network url string &optional &log (present if policy/protocols/http/detect-webapps.zeek is loaded) Most root URL where the software was discovered.
software.log Software being used on the network force_log bool &default = F &optional This can indicate that this software being detected should definitely be sent onward to the logging framework. By default, only software that is "interesting" due to a change in version or it being currently unknown is sent to the logging framework. This can be set to T to force the record to be sent to the logging framework if some amount of this tracking needs to happen in a specific way to the software.
software.log Software being used on the network unparsed_version string &log &optional The full unparsed version string found because the version parsing doesn't always work reliably in all cases and this acts as a fallback in the logs.
software.log Software being used on the network version Software::Version &log &optional Version of the software.
software.log Software being used on the network host_p port &log &optional The port on which the software is running. Only sensible for server software.

Zeek Diagnostics

LOG_NAME LOG_DESC FIELD_NAME FIELD_TYPE FIELD_DESC
broker.log Peering status events between Zeek or Broker-enabled processes message string &log &optional An optional message describing the Broker event in more detail
broker.log Peering status events between Zeek or Broker-enabled processes ev string &log The event being logged.
broker.log Peering status events between Zeek or Broker-enabled processes ty Broker::Type &log The type of the Broker event.
broker.log Peering status events between Zeek or Broker-enabled processes peer Broker::NetworkInfo &log &optional The peer (if any) with which a Broker event is concerned.
broker.log Peering status events between Zeek or Broker-enabled processes ts time &log The network time at which a Broker event occurred.
capture_loss.log Packet loss rate ts time &log Timestamp for when the measurement occurred.
capture_loss.log Packet loss rate gaps count &log Number of missed ACKs from the previous measurement interval.
capture_loss.log Packet loss rate acks count &log Total number of ACKs seen in the previous measurement interval.
capture_loss.log Packet loss rate percent_lost double &log Percentage of ACKs seen where the data being ACKed wasn't seen.
capture_loss.log Packet loss rate ts_delta interval &log The time delay between this measurement and the last.
capture_loss.log Packet loss rate peer string &log In the event that there are multiple Zeek instances logging to the same host, this distinguishes each peer with its individual name.
cluster.log Zeek cluster messages ts time &log The time at which a cluster message was generated.
cluster.log Zeek cluster messages message string &log A message indicating information about the cluster's operation.
cluster.log Zeek cluster messages node string &log The name of the node that is creating the log record.
config.log Configuration option changes location string &optional &log Optional location that triggered the change.
config.log Configuration option changes new_value string &log Value after the change.
config.log Configuration option changes old_value string &log Value before the change.
config.log Configuration option changes ts time &log Timestamp at which the configuration change occured.
config.log Configuration option changes id string &log ID of the value that was changed.
loaded_scripts.log Shows all scripts loaded by Zeek name string &log Name of the script loaded potentially with spaces included before the file name to indicate load depth. The convention is two spaces per level of depth.
packet_filter.log List packet filters that were applied init bool &log &default = F &optional Indicate if this is the filter set during initialization.
packet_filter.log List packet filters that were applied filter string &log The packet filter that is being set.
packet_filter.log List packet filters that were applied node string &log &optional This is a string representation of the node that applied this packet filter. It's mostly useful in the context of dynamically changing filters on clusters.
packet_filter.log List packet filters that were applied ts time &log The time at which the packet filter installation attempt was made.
packet_filter.log List packet filters that were applied success bool &log &default = T &optional Indicate if the filter was applied successfully.
print.log Print statements that were redirected to a log stream. vals string_vec &log Set of strings passed to the print statement.
print.log Print statements that were redirected to a log stream. ts time &log The network time at which the print statement was executed.
reporter.log Internal error/warning/info messages location string &log &optional This is the location in a Zeek script where the message originated. Not all reporter messages will have locations in them though.
reporter.log Internal error/warning/info messages level Reporter::Level &log The severity of the reporter message. Levels are INFO for informational messages, not needing specific attention; WARNING for warning of a potential problem, and ERROR for a non-fatal error that should be addressed, but doesn't terminate program execution.
reporter.log Internal error/warning/info messages message string &log An info/warning/error message that could have either been generated from the internal Zeek core or at the scripting-layer.
reporter.log Internal error/warning/info messages ts time &log The network time at which the reporter event was generated.
stats.log Memory/event/packet/lag statistics pkts_dropped count &log &optional Number of packets dropped since the last stats interval if reading live traffic.
stats.log Memory/event/packet/lag statistics pkts_link count &log &optional Number of packets seen on the link since the last stats interval if reading live traffic.
stats.log Memory/event/packet/lag statistics pkt_lag interval &log &optional Lag between the wall clock and packet timestamps if reading live traffic.
stats.log Memory/event/packet/lag statistics events_proc count &log Number of events processed since the last stats interval.
stats.log Memory/event/packet/lag statistics events_queued count &log Number of events that have been queued since the last stats interval.
stats.log Memory/event/packet/lag statistics active_tcp_conns count &log TCP connections currently in memory.
stats.log Memory/event/packet/lag statistics active_udp_conns count &log UDP connections currently in memory.
stats.log Memory/event/packet/lag statistics active_icmp_conns count &log ICMP connections currently in memory.
stats.log Memory/event/packet/lag statistics tcp_conns count &log TCP connections seen since last stats interval.
stats.log Memory/event/packet/lag statistics udp_conns count &log UDP connections seen since last stats interval.
stats.log Memory/event/packet/lag statistics icmp_conns count &log ICMP connections seen since last stats interval.
stats.log Memory/event/packet/lag statistics timers count &log Number of timers scheduled since last stats interval.
stats.log Memory/event/packet/lag statistics active_timers count &log Current number of scheduled timers.
stats.log Memory/event/packet/lag statistics files count &log Number of files seen since last stats interval.
stats.log Memory/event/packet/lag statistics active_files count &log Current number of files actively being seen.
stats.log Memory/event/packet/lag statistics dns_requests count &log Number of DNS requests seen since last stats interval.
stats.log Memory/event/packet/lag statistics active_dns_requests count &log Current number of DNS requests awaiting a reply.
stats.log Memory/event/packet/lag statistics reassem_tcp_size count &log Current size of TCP data in reassembly.
stats.log Memory/event/packet/lag statistics reassem_file_size count &log Current size of File data in reassembly.
stats.log Memory/event/packet/lag statistics reassem_frag_size count &log Current size of packet fragment data in reassembly.
stats.log Memory/event/packet/lag statistics reassem_unknown_size count &log Current size of unknown data in reassembly (this is only PIA buffer right now).
stats.log Memory/event/packet/lag statistics bytes_recv count &log Number of bytes received since the last stats interval if reading live traffic.
stats.log Memory/event/packet/lag statistics pkts_proc count &log Number of packets processed since the last stats interval.
stats.log Memory/event/packet/lag statistics mem count &log Amount of memory currently in use in MB.
stats.log Memory/event/packet/lag statistics peer string &log Peer that generated this log. Mostly for clusters.
stats.log Memory/event/packet/lag statistics ts time &log Timestamp for the measurement.