Proprietary syslog format extensions
This topic provides information about the following extensions:
BMC Autonomous Digital Enterprise Influx DB (ADEInflux)
ADEInflux is a data interchange event format that converts BMC AMI Ops performance and monitoring data to a structured ADE format and uses REST API to transmit the data to BMC Helix.
ADEInflux does not support console or status messages. Therefore, when using ADEInflux , you should leave the following OPTIONS-statement parameters with these default values:
- FORMAT(ALL, '"None"')
- NOAPFENRich
- NOSAFENRich
- NOSYSLIBENRich
- NOENCRYPTENRich
- NOUSSENRich
- CLOCKMSG(COMMAND)
- NOSTATUSTOSIEM
- NOTIMESTamp
If you alter these parameters, BMC AMI Defender produces messages that BMC Helix cannot process. This results in unnecessary overhead and the messages are discarded.
The output of ADEInflux might appear as follows:
To use the ADEInflux extension, specify ADEInflux for the SIEMtype parameter of the OPTIONS statement.
BMC Autonomous Digital Enterprise Logs (ADELog)
ADELog is a data interchange event format that converts SMF records to JSON and uses REST API to transmit the data to BMC Helix.
ADELog does not support console or status messages. Therefore, when using ADELog you should leave the following OPTIONS-statement parameters with these default values:
- FORMAT(ALL, '"None"')
- NOAPFENRich
- NOSAFENRich
- NOSYSLIBENRich
- NOENCRYPTENRich
- NOUSSENRich
- CLOCKMSG(COMMAND)
- NOSTATUSTOSIEM
- NOTIMESTamp
If you alter these parameters, BMC AMI Defender produces messages that BMC Helix cannot process. This results in messages being stored that provide no analytical purpose.
The output of ADELog might appear as follows:
To use the ADELog extension, specify ADELog for the SIEMtype parameter of the OPTIONS statement.
Common Event Format (CEF)
CEF is a log management event format. It provides a standardized, normalized syslog-record format that is supported by the following applications:
- ArcSight ESM SIEM correlation engine
- RSA (EMC) Security Analytics SIEM
- Intel Security McAfee Enterprise Security Manager
Both BMC AMI Defender and CZASEND support ArcSight Common Event Format (CEF). BMC AMI Defender optionally conforms to the CEF standard. For more information about CEF, see the relevant Micro Focus documentation.
A sample CEF-format message contains the following information:
Each color describes a section of the CEF-format message:
Color | Description |
---|---|
Yellow | Timestamp and hostname fields |
Blue | Standard header |
Green | An extension consisting of zero or more values identified by standardized CEF names, followed by an equal sign |
Magenta | An optional message field (msg=) followed by additional, non-CEF standard tags and values |
Standardized CEF names, if any apply, are displayed on the second line of the Tag CEF Name column for each field. A blank second line indicates a non-CEF standard field. For more information and a list of the field definition topics, see FIELDS-parameter.
When using the CEF extension, all time periods are reported as integral numbers of milliseconds since January 1, 1970. In the sample message, rt=1372718485293 represents UTC 22:41:25.293 on July 1, 2013.
To use the CEF extension, specify CEF for the SIEMtype parameter of the OPTIONS statement.
For information about parameter and field definition files, see Format-of-parameter-and-field-definition-files.
JavaScript Object Notation (JSON)
JSON is a lightweight data-interchange event format with a rigorously defined syntax (but not taxonomy). A mainframe security event formatted in JSON might appear as follows:
To use the JSON extension, specify JSON for the SIEMtype parameter of the OPTIONS statement.
Log Event Extended Format (LEEF)
LEEF is a customized event format for IBM Security QRadar. The RPM file name is DSM-CorreLogzOSzDefender_qradar-version_build-number.noarch.rrpm. For more information, see the IBM Security QRadar documentation.
A sample LEEF-format message contains the following information:
Each color describes a section of the LEEF-format message:
Color | Description |
---|---|
Yellow | Timestamp and hostname fields |
Blue | Standard LEEF header |
Green | An extension consisting of zero or more event attribute values identified by keys, followed by an equal sign and separated by tabs |
To use the LEEF extension, specify LEEf for the SIEMtype parameter of the OPTIONS statement.
To use zDefender or CZASEND with IBM Security QRadar, see Customizing-for-a-proprietary-syslog-extension.
Splunk
Splunk is a structured indexing and correlating standard. It improves the usability of BMC AMI Defender data in Splunk searches by formatting all fields as tag, tag=value, or tag="quoted value" and by introducing a field severity=.
To use the Splunk extension, specify SPLunk for the SIEMtype parameter of the OPTIONS statement.
The Splunk extension does not apply to CZASEND. For more information, see Customizing-for-a-proprietary-syslog-extension.
Related topic