From 958ce4df68558c1c67656d53209b1e0fdc5799a6 Mon Sep 17 00:00:00 2001 From: Eric Beahan Date: Mon, 5 Oct 2020 16:15:08 -0500 Subject: [PATCH] [1.2][DOCS] Adding discrete markers (#1006) --- docs/field-details.asciidoc | 58 +++++++++++++++++++++++++++++++++++++ 1 file changed, 58 insertions(+) diff --git a/docs/field-details.asciidoc b/docs/field-details.asciidoc index 026c99ec5b..457ec26676 100644 --- a/docs/field-details.asciidoc +++ b/docs/field-details.asciidoc @@ -4,6 +4,7 @@ The `base` field set contains all fields which are on the top level. These fields are common across all types of events. +[discrete] ==== Base Field Details [options="header"] @@ -79,6 +80,7 @@ The agent fields contain the data about the software entity, if any, that collec Examples include Beats. Agents may also run on observers. ECS agent.* fields shall be populated with details of the agent running on the host or observer where the event happened or the measurement was taken. +[discrete] ==== Agent Field Details [options="header"] @@ -159,6 +161,7 @@ example: `6.0.0-rc2` An autonomous system (AS) is a collection of connected Internet Protocol (IP) routing prefixes under the control of one or more network operators on behalf of a single administrative entity or domain that presents a common, clearly defined routing policy to the internet. +[discrete] ==== Autonomous System Field Details [options="header"] @@ -191,6 +194,7 @@ example: `Google LLC` |===== +[discrete] ==== Field Reuse The `as` fields are expected to be nested at: `client.as`, `destination.as`, `server.as`, `source.as`. @@ -209,6 +213,7 @@ For TCP events, the client is the initiator of the TCP connection that sends the Client / server representations can add semantic context to an exchange, which is helpful to visualize the data in certain situations. If your context falls in that category, you should still ensure that source and destination are filled appropriately. +[discrete] ==== Client Field Details [options="header"] @@ -354,11 +359,13 @@ example: `co.uk` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-client-nestings]] ===== Field sets that can be nested under Client @@ -394,6 +401,7 @@ example: `co.uk` Fields related to the cloud or infrastructure the events are coming from. +[discrete] ==== Cloud Field Details [options="header"] @@ -490,6 +498,7 @@ Container fields are used for meta information about the specific container that These fields help correlate data based containers from any runtime. +[discrete] ==== Container Field Details [options="header"] @@ -573,6 +582,7 @@ Destination fields describe details about the destination of a packet/event. Destination fields are usually populated in conjunction with source fields. +[discrete] ==== Destination Field Details [options="header"] @@ -718,11 +728,13 @@ example: `co.uk` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-destination-nestings]] ===== Field sets that can be nested under Destination @@ -760,6 +772,7 @@ Fields describing DNS queries and answers. DNS events should either represent a single DNS query prior to getting answers (`dns.type:query`) or they should represent a full exchange and contain the query details as well as all of the answers that were provided for this query (`dns.type:answer`). +[discrete] ==== DNS Field Details [options="header"] @@ -999,6 +1012,7 @@ example: `answer` Meta-information specific to ECS. +[discrete] ==== ECS Field Details [options="header"] @@ -1029,6 +1043,7 @@ These fields can represent errors of any kind. Use them for errors that happen while fetching events or in cases where the event itself contains an error. +[discrete] ==== Error Field Details [options="header"] @@ -1101,6 +1116,7 @@ The event fields are used for context information about the log or metric event A log is defined as an event containing details of something that happened. Log events must include the time at which the thing happened. Examples of log events include a process starting on a host, a network packet being sent from a source to a destination, or a network connection between a client and a server being initiated or closed. A metric is defined as an event containing one or more numerical or categorical measurements and the time at which the measurement was taken. Examples of metric events include memory pressure measured on a host, or vulnerabilities measured on a scanned host. +[discrete] ==== Event Field Details [options="header"] @@ -1389,6 +1405,7 @@ A file is defined as a set of information that has been created on, or has exist File objects can be associated with host events, network events, and/or file events (e.g., those produced by File Integrity Monitoring [FIM] products or services). File fields provide details about the affected file associated with the event or metric. +[discrete] ==== File Field Details [options="header"] @@ -1605,11 +1622,13 @@ example: `1001` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-file-nestings]] ===== Field sets that can be nested under File @@ -1635,6 +1654,7 @@ Geo fields can carry data about a specific location related to an event. This geolocation information can be derived from techniques such as Geo IP, or be user-supplied. +[discrete] ==== Geo Field Details [options="header"] @@ -1737,6 +1757,7 @@ example: `Quebec` |===== +[discrete] ==== Field Reuse The `geo` fields are expected to be nested at: `client.geo`, `destination.geo`, `host.geo`, `observer.geo`, `server.geo`, `source.geo`. @@ -1751,6 +1772,7 @@ Note also that the `geo` fields are not expected to be used directly at the top The group fields are meant to represent groups that are relevant to the event. +[discrete] ==== Group Field Details [options="header"] @@ -1796,6 +1818,7 @@ type: keyword |===== +[discrete] ==== Field Reuse The `group` fields are expected to be nested at: `user.group`. @@ -1812,6 +1835,7 @@ The hash fields represent different hash algorithms and their values. Field names for common hashes (e.g. MD5, SHA1) are predefined. Add fields for other hashes by lowercasing the hash algorithm name and using underscore separators as appropriate (snake case, e.g. sha3_512). +[discrete] ==== Hash Field Details [options="header"] @@ -1866,6 +1890,7 @@ type: keyword |===== +[discrete] ==== Field Reuse The `hash` fields are expected to be nested at: `file.hash`, `process.hash`. @@ -1882,6 +1907,7 @@ A host is defined as a general computing instance. ECS host.* fields should be populated with details about the host on which the event happened, or from which the measurement was taken. Host types include hardware, virtual machines, Docker containers, and Kubernetes nodes. +[discrete] ==== Host Field Details [options="header"] @@ -1990,11 +2016,13 @@ example: `1325` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-host-nestings]] ===== Field sets that can be nested under Host @@ -2030,6 +2058,7 @@ example: `1325` Fields related to HTTP activity. Use the `url` field set to store the url of the request. +[discrete] ==== HTTP Field Details [options="header"] @@ -2161,6 +2190,7 @@ The log.* fields are typically populated with details about the logging mechanis The details specific to your event source are typically not logged under `log.*`, but rather in `event.*` or in other ECS fields. +[discrete] ==== Log Field Details [options="header"] @@ -2326,6 +2356,7 @@ The network is defined as the communication path over which a host or network ev The network.* fields should be populated with details about the network activity associated with an event. +[discrete] ==== Network Field Details [options="header"] @@ -2496,6 +2527,7 @@ An observer is defined as a special network, security, or application device use This could be a custom hardware appliance or a server that has been configured to run special network, security, or application software. Examples include firewalls, web proxies, intrusion detection/prevention systems, network monitoring sensors, web application firewalls, data loss prevention systems, and APM servers. The observer.* fields shall be populated with details of the system, if any, that detects, observes and/or creates a network, security, or application event or metric. Message queues and ETL components used in processing events or metrics are not considered observers in ECS. +[discrete] ==== Observer Field Details [options="header"] @@ -2611,11 +2643,13 @@ type: keyword |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-observer-nestings]] ===== Field sets that can be nested under Observer @@ -2647,6 +2681,7 @@ The organization fields enrich data with information about the company or entity These fields help you arrange or filter data stored in an index by one or multiple organizations. +[discrete] ==== Organization Field Details [options="header"] @@ -2684,6 +2719,7 @@ type: keyword The OS fields contain information about the operating system. +[discrete] ==== Operating System Field Details [options="header"] @@ -2760,6 +2796,7 @@ example: `10.14.1` |===== +[discrete] ==== Field Reuse The `os` fields are expected to be nested at: `host.os`, `observer.os`, `user_agent.os`. @@ -2774,6 +2811,7 @@ Note also that the `os` fields are not expected to be used directly at the top l These fields contain information about an installed software package. It contains general information about a package, such as name, version or size. It also contains installation details, such as time or location. +[discrete] ==== Package Field Details [options="header"] @@ -2903,6 +2941,7 @@ These fields contain information about a process. These fields can help you correlate metrics information with a process id/name from a log message. The `process.pid` often stays in the metric itself and is copied to the global field for correlation. +[discrete] ==== Process Field Details [options="header"] @@ -3051,11 +3090,13 @@ example: `/home/alice` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-process-nestings]] ===== Field sets that can be nested under Process @@ -3083,6 +3124,7 @@ Some pieces of information can be seen in many places in an ECS event. To facili A concrete example is IP addresses, which can be under host, observer, source, destination, client, server, and network.forwarded_ip. If you append all IPs to `related.ip`, you can then search for a given IP trivially, no matter where it appeared, by querying `related.ip:a.b.c.d`. +[discrete] ==== Related Field Details [options="header"] @@ -3113,6 +3155,7 @@ For TCP events, the server is the receiver of the initial SYN packet(s) of the T Client / server representations can add semantic context to an exchange, which is helpful to visualize the data in certain situations. If your context falls in that category, you should still ensure that source and destination are filled appropriately. +[discrete] ==== Server Field Details [options="header"] @@ -3258,11 +3301,13 @@ example: `co.uk` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-server-nestings]] ===== Field sets that can be nested under Server @@ -3300,6 +3345,7 @@ The service fields describe the service for or from which the data was collected These fields help you find and correlate logs for a specific service and version. +[discrete] ==== Service Field Details [options="header"] @@ -3414,6 +3460,7 @@ Source fields describe details about the source of a packet/event. Source fields are usually populated in conjunction with destination fields. +[discrete] ==== Source Field Details [options="header"] @@ -3559,11 +3606,13 @@ example: `co.uk` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-source-nestings]] ===== Field sets that can be nested under Source @@ -3601,6 +3650,7 @@ Fields to classify events and alerts according to a threat taxonomy such as the These fields are for users to classify alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy. The threat.tactic.* are meant to capture the high level category of the threat (e.g. "impact"). The threat.technique.* fields are meant to capture which kind of approach is used by this detected threat, to accomplish the goal (e.g. "endpoint denial of service"). +[discrete] ==== Threat Field Details [options="header"] @@ -3693,6 +3743,7 @@ example: `https://attack.mitre.org/techniques/T1499/` Distributed tracing makes it possible to analyze performance throughout a microservice architecture all in one view. This is accomplished by tracing all of the requests - from the initial web request in the front-end service - to queries made through multiple back-end services. +[discrete] ==== Tracing Field Details [options="header"] @@ -3734,6 +3785,7 @@ example: `00f067aa0ba902b7` URL fields provide support for complete or partial URLs, and supports the breaking down into scheme, domain, path, and so on. +[discrete] ==== URL Field Details [options="header"] @@ -3916,6 +3968,7 @@ The user fields describe information about the user that is relevant to the even Fields can have one entry or multiple entries. If a user has more than one id, provide an array that includes all of them. +[discrete] ==== User Field Details [options="header"] @@ -3996,6 +4049,7 @@ example: `albert` |===== +[discrete] ==== Field Reuse The `user` fields are expected to be nested at: `client.user`, `destination.user`, `host.user`, `server.user`, `source.user`. @@ -4005,6 +4059,7 @@ Note also that the `user` fields may be used directly at the top level. +[discrete] [[ecs-user-nestings]] ===== Field sets that can be nested under User @@ -4030,6 +4085,7 @@ The user_agent fields normally come from a browser request. They often show up in web service logs coming from the parsed user agent string. +[discrete] ==== User agent Field Details [options="header"] @@ -4084,11 +4140,13 @@ example: `12.0` |===== +[discrete] ==== Field Reuse +[discrete] [[ecs-user_agent-nestings]] ===== Field sets that can be nested under User agent