Database Schema: Difference between revisions

From Edge Threat Management Wiki - Arista
Jump to navigationJump to search
No edit summary
 
(10 intermediate revisions by 4 users not shown)
Line 1: Line 1:
[[Category:Reports]]
= Database Tables =


All [[Reports]] data is stored in the database. All [[Events]] will add or modify data in the database.
== configuration_backup_events ==  
 
<section begin='configuration_backup_events' />
Data is stored in indexed fully-denormalized tables. For example, there is a ''http_events'' table that has one row per HTTP request and all the metadata associated with that HTTP request.
 
Below is the schema definition of all tables in the database.
 
== ipsec_tunnel_stats ==  
<section begin='ipsec_tunnel_stats' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 21: Line 15:
|The time of the event
|The time of the event
|-
|-
|tunnel_name
|success
|Tunnel Name
|Success
|boolean
|The result of the backup (true if the backup succeeded, false otherwise)
|-
|description
|Text detail of the event
|text
|text
|The name of the IPsec tunnel
|Text detail of the event
|-
|-
|in_bytes
|destination
|In Bytes
|Destination
|bigint
|text
|The number of bytes received during this time frame
|The location of the backup
|-
|out_bytes
|Out Bytes
|bigint
|The number of bytes transmitted during this time frame
|-
|-
|event_id
|event_id
Line 42: Line 36:
|-
|-
|}
|}
<section end='ipsec_tunnel_stats' />
<section end='configuration_backup_events' />
()


 
== http_events ==  
== ipsec_user_events ==  
<section begin='http_events' />
<section begin='ipsec_user_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 54: Line 48:
!Description
!Description
|-
|-
|event_id
|request_id
|Event ID
|Request ID
|bigint
|bigint
|The unique event ID
|The HTTP request ID
|-
|-
|time_stamp
|time_stamp
Line 64: Line 58:
|The time of the event
|The time of the event
|-
|-
|connect_stamp
|session_id
|Connect Time
|Session ID
|timestamp without time zone
|bigint
|The time the connection started
|The session
|-
|-
|goodbye_stamp
|client_intf
|End Time
|Client Interface
|timestamp without time zone
|smallint
|The time the connection ended
|The client interface
|-
|-
|client_address
|server_intf
|Client Address
|Server Interface
|text
|smallint
|The remote IP address of the client
|The server interface
|-
|-
|client_protocol
|c_client_addr
|Client Protocol
|Client-side Client Address
|text
|inet
|The protocol the client used to connect
|The client-side client IP address
|-
|-
|client_username
|s_client_addr
|Client Username
|Server-side Client Address
|text
|inet
|The username of the client
|The server-side client IP address
|-
|-
|net_process
|c_server_addr
|Net Process
|Client-side Server Address
|text
|inet
|The PID of the PPP process for L2TP connections or the connection ID for Xauth connections
|The client-side server IP address
|-
|-
|net_interface
|s_server_addr
|Net Interface
|Server-side Server Address
|text
|inet
|The PPP interface for L2TP connections or the client interface for Xauth connections
|The server-side server IP address
|-
|-
|elapsed_time
|c_client_port
|Elapsed Time
|Client-side Client Port
|text
|integer
|The total time the client was connected
|The client-side client port
|-
|-
|rx_bytes
|s_client_port
|Bytes Received
|Server-side Client Port
|bigint
|integer
|The number of bytes received from the client in this connection
|The server-side client port
|-
|-
|tx_bytes
|c_server_port
|Bytes Sent
|Client-side Server Port
|bigint
|integer
|The number of bytes sent to the client in this connection
|The client-side server port
|-
|-
|}
|s_server_port
<section end='ipsec_user_events' />
|Server-side Server Port
 
|integer
 
|The server-side server port
== http_events ==
<section begin='http_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|request_id
|client_country
|Request ID
|Client Country
|bigint
|text
|The HTTP request ID
|The client Country
|-
|-
|time_stamp
|client_latitude
|Timestamp
|Client Latitude
|timestamp without time zone
|real
|The time of the event
|The client Latitude
|-
|-
|session_id
|client_longitude
|Session ID
|Client Longitude
|bigint
|real
|The session
|The client Longitude
|-
|-
|client_intf
|server_country
|Client Interface
|Server Country
|smallint
|text
|The client interface
|The server Country
|-
|server_latitude
|Server Latitude
|real
|The server Latitude
|-
|server_longitude
|Server Longitude
|real
|The server Longitude
|-
|-
|server_intf
|policy_id
|Server Interface
|Policy ID
|smallint
|smallint
|The server interface
|The policy
|-
|-
|c_client_addr
|username
|Client-side Client Address
|Username
|inet
|text
|The client-side client IP address
|The username associated with this session
|-
|-
|s_client_addr
|hostname
|Server-side Client Address
|Hostname
|inet
|text
|The server-side client IP address
|The hostname of the local address
|-
|-
|c_server_addr
|method
|Client-side Server Address
|Method
|inet
|character(1)
|The client-side server IP address
|The HTTP method
|-
|-
|s_server_addr
|uri
|Server-side Server Address
|URI
|inet
|text
|The server-side server IP address
|The HTTP URI
|-
|-
|c_client_port
|host
|Client-side Client Port
|Host
|integer
|text
|The client-side client port
|The HTTP host
|-
|-
|s_client_port
|domain
|Server-side Client Port
|Domain
|integer
|text
|The server-side client port
|The HTTP domain (shortened host)
|-
|-
|c_server_port
|referer
|Client-side Server Port
|Referer
|integer
|text
|The client-side server port
|The Referer URL
|-
|-
|s_server_port
|c2s_content_length
|Server-side Server Port
|Client-to-server Content Length
|integer
|bigint
|The server-side server port
|The client-to-server content length
|-
|-
|policy_id
|s2c_content_length
|Policy ID
|Server-to-client Content Length
|smallint
|bigint
|The policy
|The server-to-client content length
|-
|-
|username
|s2c_content_type
|Username
|Server-to-client Content Type
|text
|text
|The username associated with this session
|The server-to-client content type
|-
|s2c_content_filename
|Server-to-client Content Disposition Filename
|text
|The server-to-client content disposition filename
|-
|-
|hostname
|ad_blocker_cookie_ident
|Hostname
|Ad Blocker Cookie
|text
|text
|The hostname of the local address
|This name of cookie blocked by Ad Blocker
|-
|-
|method
|ad_blocker_action
|Method
|Ad Blocker Action
|character(1)
|character(1)
|The HTTP method
|This action of Ad Blocker on this request
|-
|-
|uri
|web_filter_reason
|URI
|Reason for action (Web Filter)
|text
|character(1)
|The HTTP URI
|This reason Web Filter blocked/flagged this request
|-
|-
|host
|web_filter_category_id
|Host
|Web Category (Web Filter)
|text
|smallint
|The HTTP host
|This numeric category according to Web Filter
|-
|-
|domain
|web_filter_rule_id
|Domain
|Web Rule (Web Filter)
|text
|smallint
|The HTTP domain (shortened host)
|This numeric rule according to Web Filter
|-
|-
|referer
|web_filter_blocked
|Referer
|Blocked (Web Filter)
|text
|boolean
|The Referer URL
|If Web Filter blocked this request
|-
|-
|c2s_content_length
|web_filter_flagged
|Client-to-server Content Length
|Flagged (Web Filter)
|bigint
|boolean
|The client-to-server content length
|If Web Filter flagged this request
|-
|-
|s2c_content_length
|virus_blocker_lite_clean
|Server-to-client Content Length
|Virus Blocker Lite Clean
|bigint
|boolean
|The server-to-client content length
|The cleanliness of the file according to Virus Blocker Lite
|-
|-
|s2c_content_type
|virus_blocker_lite_name
|Server-to-client Content Type
|Virus Blocker Lite Name
|text
|text
|The server-to-client content type
|The name of the malware according to Virus Blocker Lite
|-
|-
|ad_blocker_cookie_ident
|virus_blocker_clean
|Ad Blocker Cookie
|Virus Blocker Clean
|text
|boolean
|This name of cookie blocked by Ad Blocker
|The cleanliness of the file according to Virus Blocker
|-
|-
|ad_blocker_action
|virus_blocker_name
|Ad Blocker Action
|Virus Blocker Name
|character(1)
|This action of Ad Blocker on this request
|-
|web_filter_lite_reason
|Web Filter Lite Reason
|character(1)
|This reason Web Filter Lite blocked/flagged this request
|-
|web_filter_lite_category
|Web Filter Lite Category
|text
|text
|This category according to Web Filter Lite
|The name of the malware according to Virus Blocker
|-
|-
|web_filter_lite_blocked
|threat_prevention_blocked
|Web Filter Lite Blocked
|Threat Prevention Blocked
|boolean
|boolean
|If Web Filter Lite blocked this request
|If Threat Prevention blocked this request
|-
|-
|web_filter_lite_flagged
|threat_prevention_flagged
|Web Filter Lite Flagged
|Threat Prevention Flagged
|boolean
|boolean
|If Web Filter Lite flagged this request
|If Threat Prevention flagged this request
|-
|-
|web_filter_reason
|threat_prevention_rule_id
|Web Filter Reason
|Threat Prevention Rule Id
|character(1)
|integer
|This reason Web Filter blocked/flagged this request
|This numeric rule according to Threat Prevention
|-
|-
|web_filter_category
|threat_prevention_reputation
|Web Filter Category
|Threat Prevention Reputation
|text
|smallint
|This category according to Web Filter
|This numeric threat reputation
|-
|-
|web_filter_blocked
|threat_prevention_categories
|Web Filter Blocked
|Threat Prevention Categories
|boolean
|integer
|If Web Filter blocked this request
|This bitmask of threat categories
|-
|-
|web_filter_flagged
|}
|Web Filter Flagged
<section end='http_events' />
|boolean
()
|If Web Filter flagged this request
 
|-
== intrusion_prevention_events ==  
|virus_blocker_lite_clean
<section begin='intrusion_prevention_events' />
|Virus Blocker Lite Clean
|boolean
|The cleanliness of the file according to Virus Blocker Lite
|-
|virus_blocker_lite_name
|Virus Blocker Lite Name
|text
|The name of the malware according to Virus Blocker Lite
|-
|virus_blocker_clean
|Virus Blocker Clean
|boolean
|The cleanliness of the file according to Virus Blocker
|-
|virus_blocker_name
|Virus Blocker Name
|text
|The name of the malware according to Virus Blocker
|-
|}
<section end='http_events' />
 
 
== captive_portal_user_events ==  
<section begin='captive_portal_user_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 335: Line 301:
|The time of the event
|The time of the event
|-
|-
|policy_id
|sig_id
|Policy ID
|Signature ID
|bigint
|bigint
|The policy
|This ID of the rule
|-
|-
|event_id
|gen_id
|Event ID
|Grouping ID
|bigint
|bigint
|The unique event ID
|The grouping ID for the rule, The gen_id + sig_id specify the rule's unique identifier
|-
|-
|login_name
|class_id
|Login Name
|Classtype ID
|text
|bigint
|The login username
|The numeric ID for the classtype
|-
|-
|event_info
|source_addr
|Event Type
|Source Address
|text
|inet
|The type of event (LOGIN, FAILED, TIMEOUT, INACTIVE, USER_LOGOUT, ADMIN_LOGOUT)
|The source IP address of the packet
|-
|-
|auth_type
|source_port
|Authorization Type
|Source Port
|text
|integer
|The authorization type for this event
|The source port of the packet (if applicable)
|-
|-
|client_addr
|dest_addr
|Client Address
|Destination Address
|text
|inet
|The remote IP address of the client
|The destination IP address of the packet
|-
|-
|}
|dest_port
<section end='captive_portal_user_events' />
|Destination Port
 
|integer
 
|The destination port of the packet (if applicable)
== server_events ==
<section begin='server_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|protocol
|Timestamp
|Protocol
|timestamp without time zone
|integer
|The time of the event
|The protocol of the packet
|-
|-
|load_1
|blocked
|CPU load (1-min)
|Blocked
|numeric(6,2)
|boolean
|The 1-minute CPU load
|If the packet was blocked/dropped
|-
|-
|load_5
|category
|CPU load (5-min)
|Category
|numeric(6,2)
|text
|The 5-minute CPU load
|The application specific grouping for the signature
|-
|-
|load_15
|classtype
|CPU load (15-min)
|Classtype
|numeric(6,2)
|text
|The 15-minute CPU load
|The generalized threat signature grouping (unrelated to gen_id)
|-
|-
|cpu_user
|msg
|CPU User Utilization
|Message
|numeric(6,3)
|text
|The user CPU percent utilization
|The "title" or "description" of the signature
|-
|-
|cpu_system
|rid
|CPU System Utilization
|Rule ID
|numeric(6,3)
|text
|The system CPU percent utilization
|The rule id
|-
|-
|mem_total
|rule_id
|Total Memory
|Rule ID
|bigint
|text
|The total bytes of memory
|The rule id
|-
|-
|mem_free
|}
|Memory Free
<section end='intrusion_prevention_events' />
|bigint
()
|The number of free bytes of memory
 
== smtp_tarpit_events ==
<section begin='smtp_tarpit_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|disk_total
|time_stamp
|Disk Size
|Timestamp
|bigint
|timestamp without time zone
|The total disk size in bytes
|The time of the event
|-
|-
|disk_free
|ipaddr
|Disk Free
|Client Address
|bigint
|inet
|The free disk space in bytes
|The client IP address
|-
|-
|swap_total
|hostname
|Swap Size
|Hostname
|text
|The hostname of the local address
|-
|policy_id
|Policy ID
|bigint
|bigint
|The total swap size in bytes
|The policy
|-
|vendor_name
|Vendor Name
|character varying(255)
|The "vendor name" of the app that logged the event
|-
|-
|swap_free
|event_id
|Swap Free
|Event ID
|bigint
|bigint
|The free disk swap in bytes
|The unique event ID
|-
|active_hosts
|Active Hosts
|integer
|The number of active hosts
|-
|-
|}
|}
<section end='server_events' />
<section end='smtp_tarpit_events' />
()


 
== ipsec_user_events ==  
== interface_stat_events ==  
<section begin='ipsec_user_events' />
<section begin='interface_stat_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 455: Line 426:
!Type
!Type
!Description
!Description
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|-
|time_stamp
|time_stamp
Line 461: Line 437:
|The time of the event
|The time of the event
|-
|-
|interface_id
|connect_stamp
|Interface ID
|Connect Time
|integer
|timestamp without time zone
|The interface ID
|The time the connection started
|-
|-
|rx_rate
|goodbye_stamp
|Rx Rate
|End Time
|double precision
|timestamp without time zone
|The RX rate (bytes/s)
|The time the connection ended
|-
|-
|tx_rate
|client_address
|Tx Rate
|Client Address
|double precision
|text
|The TX rate (bytes/s)
|The remote IP address of the client
|-
|-
|}
|client_protocol
<section end='interface_stat_events' />
|Client Protocol
 
|text
 
|The protocol the client used to connect
== openvpn_stats ==
<section begin='openvpn_stats' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|client_username
|Timestamp
|Client Username
|timestamp without time zone
|text
|The time of the event
|The username of the client
|-
|-
|start_time
|net_process
|Start Time
|Net Process
|timestamp without time zone
|text
|The time the OpenVPN session started
|The PID of the PPP process for L2TP connections or the connection ID for Xauth connections
|-
|-
|end_time
|net_interface
|End Time
|Net Interface
|timestamp without time zone
|text
|The time the OpenVPN session ended
|The PPP interface for L2TP connections or the client interface for Xauth connections
|-
|elapsed_time
|Elapsed Time
|text
|The total time the client was connected
|-
|-
|rx_bytes
|rx_bytes
|Bytes Received
|Bytes Received
|bigint
|bigint
|The total bytes received from the client during this session
|The number of bytes received from the client in this connection
|-
|-
|tx_bytes
|tx_bytes
|Bytes Sent
|Bytes Sent
|bigint
|bigint
|The total bytes sent to the client during this session
|The number of bytes sent to the client in this connection
|-
|-
|remote_address
|}
|Remote Address
<section end='ipsec_user_events' />
|inet
()
|The remote IP address of the client
 
== ipsec_vpn_events ==
<section begin='ipsec_vpn_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|pool_address
|event_id
|Pool Address
|Event ID
|inet
|bigint
|The pool IP address of the client
|The unique event ID
|-
|-
|remote_port
|time_stamp
|Remote Port
|Timestamp
|integer
|timestamp without time zone
|The remote port of the client
|The time of the event
|-
|local_address
|Local Address
|text
|The local address of the tunnel
|-
|remote_address
|Remote Address
|text
|The remote address of the tunnel
|-
|-
|client_name
|tunnel_description
|Client Name
|Tunnel Description
|text
|text
|The name of the client
|The description of the tunnel
|-
|-
|event_id
|event_type
|Event ID
|Event Type
|bigint
|text
|The unique event ID
|The type of the event (CONNECT,DISCONNECT)
|-
|-
|}
|}
<section end='openvpn_stats' />
<section end='ipsec_vpn_events' />
()


 
== ipsec_tunnel_stats ==  
== openvpn_events ==  
<section begin='ipsec_tunnel_stats' />
<section begin='openvpn_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 557: Line 548:
|The time of the event
|The time of the event
|-
|-
|remote_address
|tunnel_name
|Remote Address
|Tunnel Name
|inet
|text
|The remote IP address of the client
|The name of the IPsec tunnel
|-
|-
|pool_address
|in_bytes
|Pool Address
|In Bytes
|inet
|bigint
|The pool IP address of the client
|The number of bytes received during this time frame
|-
|-
|client_name
|out_bytes
|Client Name
|Out Bytes
|text
|bigint
|The name of the client
|The number of bytes transmitted during this time frame
|-
|-
|type
|event_id
|Type
|Event ID
|text
|bigint
|The type of the event (CONNECT/DISCONNECT)
|The unique event ID
|-
|-
|}
|}
<section end='openvpn_events' />
<section end='ipsec_tunnel_stats' />
()


== http_query_events ==
<section begin='http_query_events' />


== mail_msgs ==
{| border="1" cellpadding="2" width="90%%" align="center"
<section begin='mail_msgs' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Column Name
!Human Name
!Human Name
!Type
!Type
!Description
!Description
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|-
|time_stamp
|time_stamp
Line 659: Line 655:
|text
|text
|The username associated with this session
|The username associated with this session
|-
|msg_id
|Message ID
|bigint
|The message ID
|-
|subject
|Subject
|text
|The email subject
|-
|-
|hostname
|hostname
Line 675: Line 661:
|The hostname of the local address
|The hostname of the local address
|-
|-
|event_id
|request_id
|Event ID
|Request ID
|bigint
|bigint
|The unique event ID
|The HTTP request ID
|-
|-
|sender
|method
|Sender
|Method
|text
|character(1)
|The address of the sender
|The HTTP method
|-
|-
|receiver
|uri
|Receiver
|URI
|text
|text
|The address of the receiver
|The HTTP URI
|-
|-
|virus_blocker_lite_clean
|term
|Virus Blocker Lite Clean
|Search Term
|boolean
|text
|The cleanliness of the file according to Virus Blocker Lite
|The search term
|-
|-
|virus_blocker_lite_name
|host
|Virus Blocker Lite Name
|Host
|text
|text
|The name of the malware according to Virus Blocker Lite
|The HTTP host
|-
|-
|virus_blocker_clean
|c2s_content_length
|Virus Blocker Clean
|Client-to-server Content Length
|boolean
|bigint
|The cleanliness of the file according to Virus Blocker
|The client-to-server content length
|-
|-
|virus_blocker_name
|s2c_content_length
|Virus Blocker Name
|Server-to-client Content Length
|text
|bigint
|The name of the malware according to Virus Blocker
|The server-to-client content length
|-
|spam_blocker_lite_score
|Spam Blocker Lite Score
|real
|The score of the email according to Spam Blocker Lite
|-
|-
|spam_blocker_lite_is_spam
|s2c_content_type
|Spam Blocker Lite Spam
|Server-to-client Content Type
|boolean
|The spam status of the email according to Spam Blocker Lite
|-
|spam_blocker_lite_tests_string
|Spam Blocker Lite Tests
|text
|text
|The tess results for Spam Blocker Lite
|The server-to-client content type
|-
|-
|spam_blocker_lite_action
|blocked
|Spam Blocker Lite Action
|Blocked
|character(1)
|boolean
|The action taken by Spam Blocker Lite
|If Web Filter blocked this search term
|-
|spam_blocker_score
|Spam Blocker Score
|real
|The score of the email according to Spam Blocker
|-
|-
|spam_blocker_is_spam
|flagged
|Spam Blocker Spam
|Flagged
|boolean
|boolean
|The spam status of the email according to Spam Blocker
|If Web Filter flagged this search term
|-
|-
|spam_blocker_tests_string
|}
|Spam Blocker Tests
<section end='http_query_events' />
()
 
== admin_logins ==
<section begin='admin_logins' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|time_stamp
|Timestamp
|timestamp without time zone
|The time of the event
|-
|login
|Login
|text
|text
|The tess results for Spam Blocker
|The login name
|-
|-
|spam_blocker_action
|local
|Spam Blocker Action
|Local
|character(1)
|boolean
|The action taken by Spam Blocker
|True if it is a login attempt through a local process
|-
|-
|phish_blocker_score
|client_addr
|Phish Blocker Score
|Client Address
|real
|inet
|The score of the email according to Phish Blocker
|The client IP address
|-
|-
|phish_blocker_is_spam
|succeeded
|Phish Blocker Phish
|Succeeded
|boolean
|boolean
|The phish status of the email according to Phish Blocker
|True if the login succeeded, false otherwise
|-
|-
|phish_blocker_tests_string
|reason
|Phish Blocker Tests
|Reason
|text
|The tess results for Phish Blocker
|-
|phish_blocker_action
|Phish Blocker Action
|character(1)
|character(1)
|The action taken by Phish Blocker
|The reason for the login (if applicable)
|-
|-
|}
|}
<section end='mail_msgs' />
<section end='admin_logins' />
()


 
== sessions ==  
== mail_addrs ==  
<section begin='sessions' />
<section begin='mail_addrs' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 783: Line 767:
!Description
!Description
|-
|-
|time_stamp
|session_id
|Session ID
|bigint
|The session
|-
|time_stamp
|Timestamp
|Timestamp
|timestamp without time zone
|timestamp without time zone
|The time of the event
|The time of the event
|-
|-
|session_id
|end_time
|Session ID
|End Time
|bigint
|timestamp without time zone
|The session
|The time the session ended
|-
|bypassed
|Bypassed
|boolean
|True if the session was bypassed, false otherwise
|-
|-
|client_intf
|entitled
|Client Interface
|Entitled
|smallint
|boolean
|The client interface
|True if the session is entitled to premium functionality
|-
|-
|server_intf
|protocol
|Server Interface
|Protocol
|smallint
|smallint
|The server interface
|The IP protocol of session
|-
|icmp_type
|ICMP Type
|smallint
|The ICMP type of session if ICMP
|-
|hostname
|Hostname
|text
|The hostname of the local address
|-
|username
|Username
|text
|The username associated with this session
|-
|policy_id
|Policy ID
|smallint
|The policy
|-
|policy_rule_id
|Policy Rule ID
|smallint
|The ID of the matching policy rule (0 means none)
|-
|local_addr
|Local Address
|inet
|The IP address of the local participant
|-
|remote_addr
|Remote Address
|inet
|The IP address of the remote participant
|-
|-
|c_client_addr
|c_client_addr
Line 807: Line 836:
|inet
|inet
|The client-side client IP address
|The client-side client IP address
|-
|s_client_addr
|Server-side Client Address
|inet
|The server-side client IP address
|-
|-
|c_server_addr
|c_server_addr
Line 818: Line 842:
|The client-side server IP address
|The client-side server IP address
|-
|-
|s_server_addr
|c_server_port
|Server-side Server Address
|Client-side Server Port
|inet
|integer
|The server-side server IP address
|The client-side server port
|-
|-
|c_client_port
|c_client_port
Line 828: Line 852:
|The client-side client port
|The client-side client port
|-
|-
|s_client_port
|s_client_addr
|Server-side Client Port
|Server-side Client Address
|integer
|inet
|The server-side client port
|The server-side client IP address
|-
|-
|c_server_port
|s_server_addr
|Client-side Server Port
|Server-side Server Address
|integer
|inet
|The client-side server port
|The server-side server IP address
|-
|-
|s_server_port
|s_server_port
Line 843: Line 867:
|The server-side server port
|The server-side server port
|-
|-
|policy_id
|s_client_port
|Policy ID
|Server-side Client Port
|bigint
|integer
|The policy
|The server-side client port
|-
|-
|username
|client_intf
|Username
|Client Interface
|text
|smallint
|The username associated with this session
|The client interface
|-
|-
|msg_id
|server_intf
|Message ID
|Server Interface
|bigint
|smallint
|The message ID
|The server interface
|-
|-
|subject
|client_country
|Subject
|Client Country
|text
|text
|The email subject
|The client Country
|-
|-
|addr
|client_latitude
|Address
|Client Latitude
|text
|real
|The address of this event
|The client Latitude
|-
|client_longitude
|Client Longitude
|real
|The client Longitude
|-
|-
|addr_name
|server_country
|Address Name
|Server Country
|text
|text
|The name for this address
|The server Country
|-
|-
|addr_kind
|server_latitude
|Address Kind
|Server Latitude
|character(1)
|real
|The type for this address (F=From, T=To, C=CC, G=Envelope From, B=Envelope To, X=Unknown)
|The server Latitude
|-
|-
|hostname
|server_longitude
|Hostname
|Server Longitude
|text
|real
|The hostname of the local address
|The server Longitude
|-
|-
|event_id
|c2p_bytes
|Event ID
|From-Client Bytes
|bigint
|bigint
|The unique event ID
|The number of bytes the client sent to Untangle (client-to-pipeline)
|-
|p2c_bytes
|To-Client Bytes
|bigint
|The number of bytes Untangle sent to client (pipeline-to-client)
|-
|-
|sender
|s2p_bytes
|Sender
|From-Server Bytes
|text
|bigint
|The address of the sender
|The number of bytes the server sent to Untangle (client-to-pipeline)
|-
|-
|virus_blocker_lite_clean
|p2s_bytes
|Virus Blocker Lite Clean
|To-Server Bytes
|boolean
|bigint
|The cleanliness of the file according to Virus Blocker Lite
|The number of bytes Untangle sent to server (pipeline-to-client)
|-
|-
|virus_blocker_lite_name
|filter_prefix
|Virus Blocker Lite Name
|Filter Block
|text
|text
|The name of the malware according to Virus Blocker Lite
|The network filter that blocked the connection (filter,shield,invalid)
|-
|-
|virus_blocker_clean
|firewall_blocked
|Virus Blocker Clean
|Firewall Blocked
|boolean
|boolean
|The cleanliness of the file according to Virus Blocker
|True if Firewall blocked the session, false otherwise
|-
|-
|virus_blocker_name
|firewall_flagged
|Virus Blocker Name
|Firewall Flagged
|text
|boolean
|The name of the malware according to Virus Blocker
|True if Firewall flagged the session, false otherwise
|-
|firewall_rule_index
|Firewall Rule ID
|integer
|The matching rule in Firewall (if any)
|-
|-
|spam_blocker_lite_score
|threat_prevention_blocked
|Spam Blocker Lite Score
|Threat Prevention Blocked
|real
|boolean
|The score of the email according to Spam Blocker Lite
|If Threat Prevention blocked
|-
|-
|spam_blocker_lite_is_spam
|threat_prevention_flagged
|Spam Blocker Lite Spam
|Threat Prevention Flagged
|boolean
|boolean
|The spam status of the email according to Spam Blocker Lite
|If Threat Prevention flagged
|-
|-
|spam_blocker_lite_action
|threat_prevention_reason
|Spam Blocker Lite Action
|Threat Prevention Reason
|character(1)
|character(1)
|The action taken by Spam Blocker Lite
|Threat Prevention reason
|-
|threat_prevention_rule_id
|Threat Prevention Rule Id
|integer
|Numeric rule id of Threat Prevention
|-
|-
|spam_blocker_lite_tests_string
|threat_prevention_client_reputation
|Spam Blocker Lite Tests
|Threat Prevention Client Reputation
|text
|smallint
|The tess results for Spam Blocker Lite
|Numeric client reputation of Threat Prevention
|-
|-
|spam_blocker_score
|threat_prevention_client_categories
|Spam Blocker Score
|Threat Prevention Client Categories
|real
|integer
|The score of the email according to Spam Blocker
|Bitmask client categories of Threat Prevention
|-
|-
|spam_blocker_is_spam
|threat_prevention_server_reputation
|Spam Blocker Spam
|Threat Prevention Server Reputation
|boolean
|smallint
|The spam status of the email according to Spam Blocker
|Numeric server reputation of Threat Prevention
|-
|-
|spam_blocker_action
|threat_prevention_server_categories
|Spam Blocker Action
|Threat Prevention Server Categories
|character(1)
|integer
|The action taken by Spam Blocker
|Bitmask server categories of Threat Prevention
|-
|-
|spam_blocker_tests_string
|application_control_lite_protocol
|Spam Blocker Tests
|Application Control Lite Protocol
|text
|text
|The tess results for Spam Blocker
|The application protocol according to Application Control Lite
|-
|-
|phish_blocker_score
|application_control_lite_blocked
|Phish Blocker Score
|Application Control Lite Blocked
|real
|boolean
|The score of the email according to Phish Blocker
|True if Application Control Lite blocked the session
|-
|-
|phish_blocker_is_spam
|captive_portal_blocked
|Phish Blocker Phish
|Captive Portal Blocked
|boolean
|boolean
|The phish status of the email according to Phish Blocker
|True if Captive Portal blocked the session
|-
|-
|phish_blocker_tests_string
|captive_portal_rule_index
|Phish Blocker Tests
|Captive Portal Rule ID
|integer
|The matching rule in Captive Portal (if any)
|-
|application_control_application
|Application Control Application
|text
|The application according to Application Control
|-
|application_control_protochain
|Application Control Protochain
|text
|text
|The tess results for Phish Blocker
|The protochain according to Application Control
|-
|-
|phish_blocker_action
|application_control_category
|Phish Blocker Action
|Application Control Category
|character(1)
|text
|The action taken by Phish Blocker
|The category according to Application Control
|-
|-
|}
|application_control_blocked
<section end='mail_addrs' />
|Application Control Blocked
 
|boolean
 
|True if Application Control blocked the session
== smtp_tarpit_events ==
<section begin='smtp_tarpit_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|application_control_flagged
|Timestamp
|Application Control Flagged
|timestamp without time zone
|boolean
|The time of the event
|True if Application Control flagged the session
|-
|-
|ipaddr
|application_control_confidence
|Client Address
|Application Control Confidence
|inet
|integer
|The client IP address
|True if Application Control confidence of this session's identification
|-
|-
|hostname
|application_control_ruleid
|Hostname
|Application Control Rule ID
|text
|integer
|The hostname of the local address
|The matching rule in Application Control (if any)
|-
|-
|policy_id
|application_control_detail
|Policy ID
|Application Control Detail
|bigint
|text
|The policy
|The text detail from the Application Control engine
|-
|bandwidth_control_priority
|Bandwidth Control Priority
|integer
|The priority given to this session
|-
|-
|vendor_name
|bandwidth_control_rule
|Vendor Name
|Bandwidth Control Rule ID
|character varying(255)
|integer
|The "vendor name" of the app that logged the event
|The matching rule in Bandwidth Control rule (if any)
|-
|-
|event_id
|ssl_inspector_ruleid
|Event ID
|SSL Inspector Rule ID
|bigint
|integer
|The unique event ID
|The matching rule in SSL Inspector rule (if any)
|-
|-
|}
|ssl_inspector_status
<section end='smtp_tarpit_events' />
|SSL Inspector Status
 
|text
 
|The status/action of the SSL session (INSPECTED,IGNORED,BLOCKED,UNTRUSTED,ABANDONED)
== ftp_events ==  
|-
<section begin='ftp_events' />
|ssl_inspector_detail
|SSL Inspector Detail
|text
|Additional text detail about the SSL connection (SNI, IP Address)
|-
|tags
|Tags
|text
|The tags on this session
|-
|}
<section end='sessions' />
()
 
== session_minutes ==  
<section begin='session_minutes' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 1,029: Line 1,095:
!Description
!Description
|-
|-
|event_id
|session_id
|Event ID
|Session ID
|bigint
|bigint
|The unique event ID
|The session
|-
|-
|time_stamp
|time_stamp
Line 1,039: Line 1,105:
|The time of the event
|The time of the event
|-
|-
|session_id
|c2s_bytes
|Session ID
|From-Client Bytes
|bigint
|bigint
|The session
|The number of bytes the client sent
|-
|-
|client_intf
|s2c_bytes
|Client Interface
|From-Server Bytes
|smallint
|bigint
|The client interface
|The number of bytes the server sent
|-
|-
|server_intf
|start_time
|Server Interface
|Start Time
|smallint
|timestamp without time zone
|The server interface
|The start time of the session
|-
|-
|c_client_addr
|end_time
|Client-side Client Address
|End Time
|inet
|timestamp without time zone
|The client-side client IP address
|The time the session ended
|-
|-
|s_client_addr
|bypassed
|Server-side Client Address
|Bypassed
|inet
|boolean
|The server-side client IP address
|True if the session was bypassed, false otherwise
|-
|-
|c_server_addr
|entitled
|Client-side Server Address
|Entitled
|inet
|boolean
|The client-side server IP address
|True if the session is entitled to premium functionality
|-
|protocol
|Protocol
|smallint
|The IP protocol of session
|-
|-
|s_server_addr
|icmp_type
|Server-side Server Address
|ICMP Type
|inet
|smallint
|The server-side server IP address
|The ICMP type of session if ICMP
|-
|-
|policy_id
|hostname
|Policy ID
|Hostname
|bigint
|text
|The policy
|The hostname of the local address
|-
|-
|username
|username
Line 1,084: Line 1,155:
|The username associated with this session
|The username associated with this session
|-
|-
|hostname
|policy_id
|Hostname
|Policy ID
|text
|smallint
|The hostname of the local address
|The policy
|-
|-
|request_id
|policy_rule_id
|Request ID
|Policy Rule ID
|bigint
|smallint
|The FTP request ID
|The ID of the matching policy rule (0 means none)
|-
|-
|method
|local_addr
|Method
|Local Address
|character(1)
|inet
|The FTP method
|The IP address of the local participant
|-
|-
|uri
|remote_addr
|URI
|Remote Address
|text
|inet
|The FTP URI
|The IP address of the remote participant
|-
|-
|virus_blocker_lite_clean
|c_client_addr
|Virus Blocker Lite Clean
|Client-side Client Address
|boolean
|inet
|The cleanliness of the file according to Virus Blocker Lite
|The client-side client IP address
|-
|-
|virus_blocker_lite_name
|c_server_addr
|Virus Blocker Lite Name
|Client-side Server Address
|text
|inet
|The name of the malware according to Virus Blocker Lite
|The client-side server IP address
|-
|c_server_port
|Client-side Server Port
|integer
|The client-side server port
|-
|-
|virus_blocker_clean
|c_client_port
|Virus Blocker Clean
|Client-side Client Port
|boolean
|integer
|The cleanliness of the file according to Virus Blocker
|The client-side client port
|-
|-
|virus_blocker_name
|s_client_addr
|Virus Blocker Name
|Server-side Client Address
|text
|inet
|The name of the malware according to Virus Blocker
|The server-side client IP address
|-
|-
|}
|s_server_addr
<section end='ftp_events' />
|Server-side Server Address
 
|inet
 
|The server-side server IP address
== wan_failover_test_events ==
<section begin='wan_failover_test_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|s_server_port
|Timestamp
|Server-side Server Port
|timestamp without time zone
|integer
|The time of the event
|The server-side server port
|-
|-
|interface_id
|s_client_port
|Interface ID
|Server-side Client Port
|integer
|integer
|This interface ID
|The server-side client port
|-
|-
|name
|client_intf
|Interface Name
|Client Interface
|text
|smallint
|This name of the interface
|The client interface
|-
|-
|description
|server_intf
|Text detail of the event
|Server Interface
|smallint
|The server interface
|-
|client_country
|Client Country
|text
|text
|The description from the test rule
|The client Country
|-
|-
|success
|client_latitude
|Success
|Client Latitude
|boolean
|real
|The result of the test (true if the test succeeded, false otherwise)
|The client Latitude
|-
|-
|event_id
|client_longitude
|Event ID
|Client Longitude
|bigint
|real
|The unique event ID
|The client Longitude
|-
|-
|}
|server_country
<section end='wan_failover_test_events' />
|Server Country
 
|text
 
|The server Country
== wan_failover_action_events ==
<section begin='wan_failover_action_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|server_latitude
|Timestamp
|Server Latitude
|timestamp without time zone
|real
|The time of the event
|The server Latitude
|-
|-
|interface_id
|server_longitude
|Interface ID
|Server Longitude
|integer
|real
|This interface ID
|The server Longitude
|-
|-
|action
|filter_prefix
|Action
|Filter Block
|text
|text
|This action (CONNECTED/DISCONNECTED)
|The network filter that blocked the connection (filter,shield,invalid)
|-
|-
|os_name
|firewall_blocked
|Interface O/S Name
|Firewall Blocked
|text
|boolean
|This O/S name of the interface
|True if Firewall blocked the session, false otherwise
|-
|-
|name
|firewall_flagged
|Interface Name
|Firewall Flagged
|text
|boolean
|This name of the interface
|True if Firewall flagged the session, false otherwise
|-
|-
|event_id
|firewall_rule_index
|Event ID
|Firewall Rule ID
|bigint
|integer
|The unique event ID
|The matching rule in Firewall (if any)
|-
|-
|}
|threat_prevention_blocked
<section end='wan_failover_action_events' />
|Threat Prevention Blocked
 
|boolean
 
|If Threat Prevention blocked
== intrusion_prevention_events ==
<section begin='intrusion_prevention_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|threat_prevention_flagged
|Timestamp
|Threat Prevention Flagged
|timestamp without time zone
|boolean
|The time of the event
|If Threat Prevention flagged
|-
|threat_prevention_reason
|Threat Prevention Reason
|character(1)
|Threat Prevention reason
|-
|-
|sig_id
|threat_prevention_rule_id
|Signature ID
|Threat Prevention Rule Id
|bigint
|integer
|This ID of the rule
|Numeric rule id of Threat Prevention
|-
|-
|gen_id
|threat_prevention_client_reputation
|Grouping ID
|Threat Prevention Client Reputation
|bigint
|smallint
|The grouping ID for the rule, The gen_id + sig_id specify the rule's unique identifier
|Numeric client reputation of Threat Prevention
|-
|-
|class_id
|threat_prevention_client_categories
|Classtype ID
|Threat Prevention Client Categories
|bigint
|integer
|The numeric ID for the classtype
|Bitmask client categories of Threat Prevention
|-
|-
|source_addr
|threat_prevention_server_reputation
|Source Address
|Threat Prevention Server Reputation
|inet
|smallint
|The source IP address of the packet
|Numeric server reputation of Threat Prevention
|-
|-
|source_port
|threat_prevention_server_categories
|Source Port
|Threat Prevention Server Categories
|integer
|integer
|The source port of the packet (if applicable)
|Bitmask server categories of Threat Prevention
|-
|-
|dest_addr
|application_control_lite_protocol
|Destination Address
|Application Control Lite Protocol
|inet
|text
|The destination IP address of the packet
|The application protocol according to Application Control Lite
|-
|application_control_lite_blocked
|Application Control Lite Blocked
|boolean
|True if Application Control Lite blocked the session
|-
|-
|dest_port
|captive_portal_blocked
|Destination Port
|Captive Portal Blocked
|integer
|boolean
|The destination port of the packet (if applicable)
|True if Captive Portal blocked the session
|-
|-
|protocol
|captive_portal_rule_index
|Protocol
|Captive Portal Rule ID
|integer
|integer
|The protocol of the packet
|The matching rule in Captive Portal (if any)
|-
|-
|blocked
|application_control_application
|Blocked
|Application Control Application
|boolean
|If the packet was blocked/dropped
|-
|category
|Category
|text
|text
|The application specific grouping
|The application according to Application Control
|-
|-
|classtype
|application_control_protochain
|Classtype
|Application Control Protochain
|text
|text
|The generalized threat rule grouping (unrelated to gen_id)
|The protochain according to Application Control
|-
|-
|msg
|application_control_category
|Message
|Application Control Category
|text
|text
|The "title" or "description" of the rule
|The category according to Application Control
|-
|-
|}
|application_control_blocked
<section end='intrusion_prevention_events' />
|Application Control Blocked
 
|boolean
 
|True if Application Control blocked the session
== web_cache_stats ==
<section begin='web_cache_stats' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|time_stamp
|application_control_flagged
|Timestamp
|Application Control Flagged
|timestamp without time zone
|boolean
|The time of the event
|True if Application Control flagged the session
|-
|-
|hits
|application_control_confidence
|Hits
|Application Control Confidence
|bigint
|integer
|The number of cache hits during this time frame
|True if Application Control confidence of this session's identification
|-
|-
|misses
|application_control_ruleid
|Misses
|Application Control Rule ID
|bigint
|integer
|The number of cache misses during this time frame
|The matching rule in Application Control (if any)
|-
|-
|bypasses
|application_control_detail
|Bypasses
|Application Control Detail
|bigint
|text
|The number of cache user bypasses during this time frame
|The text detail from the Application Control engine
|-
|-
|systems
|bandwidth_control_priority
|System bypasses
|Bandwidth Control Priority
|bigint
|integer
|The number of cache system bypasses during this time frame
|The priority given to this session
|-
|-
|hit_bytes
|bandwidth_control_rule
|Hit Bytes
|Bandwidth Control Rule ID
|bigint
|integer
|The number of bytes saved from cache hits
|The matching rule in Bandwidth Control rule (if any)
|-
|ssl_inspector_ruleid
|SSL Inspector Rule ID
|integer
|The matching rule in SSL Inspector rule (if any)
|-
|ssl_inspector_status
|SSL Inspector Status
|text
|The status/action of the SSL session (INSPECTED,IGNORED,BLOCKED,UNTRUSTED,ABANDONED)
|-
|-
|miss_bytes
|ssl_inspector_detail
|Miss Bytes
|SSL Inspector Detail
|bigint
|text
|The number of bytes not saved from cache misses
|Additional text detail about the SSL connection (SNI, IP Address)
|-
|-
|event_id
|tags
|Event ID
|Tags
|bigint
|text
|The unique event ID
|The tags on this session
|-
|-
|}
|}
<section end='web_cache_stats' />
<section end='session_minutes' />
()


 
== quotas ==  
== http_query_events ==  
<section begin='quotas' />
<section begin='http_query_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 1,353: Line 1,417:
!Type
!Type
!Description
!Description
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|-
|time_stamp
|time_stamp
Line 1,364: Line 1,423:
|The time of the event
|The time of the event
|-
|-
|session_id
|entity
|Session ID
|Entity
|text
|The IP entity given the quota (address/username)
|-
|action
|Action
|integer
|The action (1=Quota Given, 2=Quota Exceeded)
|-
|size
|Size
|bigint
|bigint
|The session
|The size of the quota
|-
|-
|client_intf
|reason
|Client Interface
|Reason
|smallint
|text
|The client interface
|The reason for the action
|-
|-
|server_intf
|}
|Server Interface
<section end='quotas' />
|smallint
()
|The server interface
 
== host_table_updates ==
<section begin='host_table_updates' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|c_client_addr
|address
|Client-side Client Address
|Address
|inet
|inet
|The client-side client IP address
|The IP address of the host
|-
|-
|s_client_addr
|key
|Server-side Client Address
|Key
|inet
|text
|The server-side client IP address
|The key being updated
|-
|-
|c_server_addr
|value
|Client-side Server Address
|Value
|inet
|text
|The client-side server IP address
|The new value for the key
|-
|-
|s_server_addr
|old_value
|Server-side Server Address
|Old Value
|inet
|text
|The server-side server IP address
|The old value for the key
|-
|-
|c_client_port
|time_stamp
|Client-side Client Port
|Timestamp
|integer
|timestamp without time zone
|The client-side client port
|The time of the event
|-
|-
|s_client_port
|}
|Server-side Client Port
<section end='host_table_updates' />
|integer
()
|The server-side client port
 
== device_table_updates ==
<section begin='device_table_updates' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|c_server_port
|mac_address
|Client-side Server Port
|MAC Address
|integer
|text
|The client-side server port
|The MAC address of the device
|-
|-
|s_server_port
|key
|Server-side Server Port
|Key
|integer
|text
|The server-side server port
|The key being updated
|-
|-
|policy_id
|value
|Policy ID
|Value
|bigint
|The policy
|-
|username
|Username
|text
|text
|The username associated with this session
|The new value for the key
|-
|-
|hostname
|old_value
|Hostname
|Old Value
|text
|text
|The hostname of the local address
|The old value for the key
|-
|-
|request_id
|time_stamp
|Request ID
|Timestamp
|bigint
|timestamp without time zone
|The HTTP request ID
|The time of the event
|-
|-
|method
|}
|Method
<section end='device_table_updates' />
|character(1)
()
|The HTTP method
 
== user_table_updates ==
<section begin='user_table_updates' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|uri
|username
|URI
|Username
|text
|text
|The HTTP URI
|The username
|-
|-
|term
|key
|Search Term
|Key
|text
|text
|The search term
|The key being updated
|-
|-
|host
|value
|Host
|Value
|text
|text
|The HTTP host
|The new value for the key
|-
|-
|c2s_content_length
|old_value
|Client-to-server Content Length
|Old Value
|bigint
|text
|The client-to-server content length
|The old value for the key
|-
|-
|s2c_content_length
|time_stamp
|Server-to-client Content Length
|Timestamp
|bigint
|timestamp without time zone
|The server-to-client content length
|The time of the event
|-
|s2c_content_type
|Server-to-client Content Type
|text
|The server-to-client content type
|-
|-
|}
|}
<section end='http_query_events' />
<section end='user_table_updates' />
()


 
== alerts ==  
== directory_connector_login_events ==  
<section begin='alerts' />
<section begin='directory_connector_login_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 1,492: Line 1,575:
|The time of the event
|The time of the event
|-
|-
|login_name
|description
|Login Name
|Text detail of the event
|text
|text
|The login name
|The description from the alert rule.
|-
|-
|domain
|summary_text
|Domain
|Summary Text
|text
|text
|The AD domain
|The summary text of the alert
|-
|-
|type
|json
|Type
|JSON Text
|text
|text
|The type of event (I=Login,U=Update,O=Logout)
|The summary JSON representation of the event causing the alert
|-
|client_addr
|Client Address
|inet
|The client IP address
|-
|-
|}
|}
<section end='directory_connector_login_events' />
<section end='alerts' />
()


 
== settings_changes ==  
== admin_logins ==  
<section begin='settings_changes' />
<section begin='admin_logins' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 1,530: Line 1,608:
|The time of the event
|The time of the event
|-
|-
|login
|settings_file
|Login
|Settings File
|text
|text
|The login name
|The name of the file changed
|-
|-
|local
|username
|Local
|Username
|boolean
|text
|True if it is a login attempt through a local process
|The username logged in at the time of the change
|-
|-
|client_addr
|hostname
|Client Address
|Hostname
|inet
|text
|The client IP address
|The remote hostname
|-
|succeeded
|Succeeded
|boolean
|True if the login succeeded, false otherwise
|-
|reason
|Reason
|character(1)
|The reason for the login (if applicable)
|-
|-
|}
|}
<section end='admin_logins' />
<section end='settings_changes' />
()


 
== web_cache_stats ==  
== sessions ==  
<section begin='web_cache_stats' />
<section begin='sessions' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 1,567: Line 1,635:
!Type
!Type
!Description
!Description
|-
|session_id
|Session ID
|bigint
|The session
|-
|-
|time_stamp
|time_stamp
Line 1,578: Line 1,641:
|The time of the event
|The time of the event
|-
|-
|end_time
|hits
|End Time
|Hits
|timestamp without time zone
|bigint
|The time the session ended
|The number of cache hits during this time frame
|-
|-
|bypassed
|misses
|Bypassed
|Misses
|boolean
|bigint
|True if the session was bypassed, false otherwise
|The number of cache misses during this time frame
|-
|-
|entitled
|bypasses
|Entitled
|Bypasses
|boolean
|bigint
|True if the session is entitled to premium functionality
|The number of cache user bypasses during this time frame
|-
|-
|protocol
|systems
|Protocol
|System bypasses
|smallint
|bigint
|The IP protocol of session
|The number of cache system bypasses during this time frame
|-
|-
|icmp_type
|hit_bytes
|ICMP Type
|Hit Bytes
|smallint
|bigint
|The ICMP type of session if ICMP
|The number of bytes saved from cache hits
|-
|-
|hostname
|miss_bytes
|Hostname
|Miss Bytes
|text
|bigint
|The hostname of the local address
|The number of bytes not saved from cache misses
|-
|-
|username
|event_id
|Username
|Event ID
|text
|bigint
|The username associated with this session
|The unique event ID
|-
|-
|policy_id
|}
|Policy ID
<section end='web_cache_stats' />
|smallint
()
|The policy
 
|-
== server_events ==
|policy_rule_id
<section begin='server_events' />
|Policy Rule ID
 
|smallint
{| border="1" cellpadding="2" width="90%%" align="center"
|The ID of the matching policy rule (0 means none)
!Column Name
!Human Name
!Type
!Description
|-
|-
|local_addr
|time_stamp
|Local Address
|Timestamp
|inet
|timestamp without time zone
|The IP address of the local participant
|The time of the event
|-
|-
|remote_addr
|load_1
|Remote Address
|CPU load (1-min)
|inet
|numeric(6,2)
|The IP address of the remote participant
|The 1-minute CPU load
|-
|-
|c_client_addr
|load_5
|Client-side Client Address
|CPU load (5-min)
|inet
|numeric(6,2)
|The client-side client IP address
|The 5-minute CPU load
|-
|-
|c_server_addr
|load_15
|Client-side Server Address
|CPU load (15-min)
|inet
|numeric(6,2)
|The client-side server IP address
|The 15-minute CPU load
|-
|-
|c_server_port
|cpu_user
|Client-side Server Port
|CPU User Utilization
|integer
|numeric(6,3)
|The client-side server port
|The user CPU percent utilization
|-
|-
|c_client_port
|cpu_system
|Client-side Client Port
|CPU System Utilization
|integer
|numeric(6,3)
|The client-side client port
|The system CPU percent utilization
|-
|-
|s_client_addr
|mem_total
|Server-side Client Address
|Total Memory
|inet
|bigint
|The server-side client IP address
|The total bytes of memory
|-
|-
|s_server_addr
|mem_free
|Server-side Server Address
|Memory Free
|inet
|bigint
|The server-side server IP address
|The number of free bytes of memory
|-
|-
|s_server_port
|disk_total
|Server-side Server Port
|Disk Size
|integer
|bigint
|The server-side server port
|The total disk size in bytes
|-
|-
|s_client_port
|disk_free
|Server-side Client Port
|Disk Free
|integer
|bigint
|The server-side client port
|The free disk space in bytes
|-
|-
|client_intf
|swap_total
|Client Interface
|Swap Size
|smallint
|bigint
|The client interface
|The total swap size in bytes
|-
|-
|server_intf
|swap_free
|Server Interface
|Swap Free
|smallint
|bigint
|The server interface
|The free disk swap in bytes
|-
|-
|client_country
|active_hosts
|Client Country
|Active Hosts
|text
|integer
|The client Country
|The number of active hosts
|-
|-
|client_latitude
|}
|Client Latitude
<section end='server_events' />
|real
()
|The client Latitude
 
== interface_stat_events ==
<section begin='interface_stat_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|client_longitude
|time_stamp
|Client Longitude
|Timestamp
|real
|timestamp without time zone
|The client Longitude
|The time of the event
|-
|-
|server_country
|interface_id
|Server Country
|Interface ID
|text
|integer
|The server Country
|The interface ID
|-
|-
|server_latitude
|rx_rate
|Server Latitude
|Rx Rate
|real
|double precision
|The server Latitude
|The RX rate (bytes/s)
|-
|-
|server_longitude
|rx_bytes
|Server Longitude
|Bytes Received
|real
|The server Longitude
|-
|c2p_bytes
|From-Client Bytes
|bigint
|bigint
|The number of bytes the client sent to Untangle (client-to-pipeline)
|The number of bytes received from the client in this connection
|-
|-
|p2c_bytes
|tx_rate
|To-Client Bytes
|Tx Rate
|bigint
|double precision
|The number of bytes Untangle sent to client (pipeline-to-client)
|The TX rate (bytes/s)
|-
|-
|s2p_bytes
|tx_bytes
|From-Server Bytes
|Bytes Sent
|bigint
|bigint
|The number of bytes the server sent to Untangle (client-to-pipeline)
|The number of bytes sent to the client in this connection
|-
|-
|p2s_bytes
|}
|To-Server Bytes
<section end='interface_stat_events' />
|bigint
()
|The number of bytes Untangle sent to server (pipeline-to-client)
 
== mail_msgs ==
<section begin='mail_msgs' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|filter_prefix
|time_stamp
|Filter Block
|Timestamp
|text
|timestamp without time zone
|The network filter that blocked the connection
|The time of the event
|-
|-
|firewall_blocked
|session_id
|Firewall Blocked
|Session ID
|boolean
|bigint
|True if Firewall blocked the session, false otherwise
|The session
|-
|-
|firewall_flagged
|client_intf
|Firewall Flagged
|Client Interface
|boolean
|smallint
|True if Firewall flagged the session, false otherwise
|The client interface
|-
|-
|firewall_rule_index
|server_intf
|Firewall Rule ID
|Server Interface
|integer
|smallint
|The matching rule in Firewall (if any)
|The server interface
|-
|-
|application_control_lite_protocol
|c_client_addr
|Application Control Lite Protocol
|Client-side Client Address
|text
|inet
|The application protocol according to Application Control Lite
|The client-side client IP address
|-
|-
|application_control_lite_blocked
|s_client_addr
|Application Control Lite Blocked
|Server-side Client Address
|boolean
|inet
|True if Application Control Lite blocked the session
|The server-side client IP address
|-
|c_server_addr
|Client-side Server Address
|inet
|The client-side server IP address
|-
|-
|captive_portal_blocked
|s_server_addr
|Captive Portal Blocked
|Server-side Server Address
|boolean
|inet
|True if Captive Portal blocked the session
|The server-side server IP address
|-
|-
|captive_portal_rule_index
|c_client_port
|Captive Portal Rule ID
|Client-side Client Port
|integer
|integer
|The matching rule in Captive Portal (if any)
|The client-side client port
|-
|-
|application_control_application
|s_client_port
|Application Control Application
|Server-side Client Port
|text
|integer
|The application according to Application Control
|The server-side client port
|-
|-
|application_control_protochain
|c_server_port
|Application Control Protochain
|Client-side Server Port
|text
|integer
|The protochain according to Application Control
|The client-side server port
|-
|s_server_port
|Server-side Server Port
|integer
|The server-side server port
|-
|policy_id
|Policy ID
|bigint
|The policy
|-
|-
|application_control_category
|username
|Application Control Category
|Username
|text
|text
|The category according to Application Control
|The username associated with this session
|-
|-
|application_control_blocked
|msg_id
|Application Control Blocked
|Message ID
|boolean
|bigint
|True if Application Control blocked the session
|The message ID
|-
|-
|application_control_flagged
|subject
|Application Control Flagged
|Subject
|boolean
|text
|True if Application Control flagged the session
|The email subject
|-
|-
|application_control_confidence
|hostname
|Application Control Confidence
|Hostname
|integer
|text
|True if Application Control confidence of this session's identification
|The hostname of the local address
|-
|-
|application_control_ruleid
|event_id
|Application Control Rule ID
|Event ID
|integer
|bigint
|The matching rule in Application Control (if any)
|The unique event ID
|-
|-
|application_control_detail
|sender
|Application Control Detail
|Sender
|text
|text
|The text detail from the Application Control engine
|The address of the sender
|-
|-
|bandwidth_control_priority
|receiver
|Bandwidth Control Priority
|Receiver
|integer
|text
|The priority given to this session
|The address of the receiver
|-
|-
|bandwidth_control_rule
|virus_blocker_lite_clean
|Bandwidth Control Rule ID
|Virus Blocker Lite Clean
|integer
|boolean
|The matching rule in Bandwidth Control rule (if any)
|The cleanliness of the file according to Virus Blocker Lite
|-
|-
|ssl_inspector_ruleid
|virus_blocker_lite_name
|SSL Inspector Rule ID
|Virus Blocker Lite Name
|integer
|text
|The matching rule in SSL Inspector rule (if any)
|The name of the malware according to Virus Blocker Lite
|-
|-
|ssl_inspector_status
|virus_blocker_clean
|SSL Inspector Status
|Virus Blocker Clean
|text
|boolean
|The status/action of the SSL session (INSPECTED/IGNORED/BLOCKED/UNTRUSTED/ABANDONED)
|The cleanliness of the file according to Virus Blocker
|-
|-
|ssl_inspector_detail
|virus_blocker_name
|SSL Inspector Detail
|Virus Blocker Name
|text
|text
|Additional text detail about the SSL connection (SNI, IP Address)
|The name of the malware according to Virus Blocker
|-
|-
|}
|spam_blocker_lite_score
<section end='sessions' />
|Spam Blocker Lite Score
 
|real
 
|The score of the email according to Spam Blocker Lite
== session_minutes ==
<section begin='session_minutes' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|session_id
|spam_blocker_lite_is_spam
|Session ID
|Spam Blocker Lite Spam
|bigint
|boolean
|The session
|The spam status of the email according to Spam Blocker Lite
|-
|-
|time_stamp
|spam_blocker_lite_tests_string
|Timestamp
|Spam Blocker Lite Tests
|timestamp without time zone
|text
|The time of the event
|The tess results for Spam Blocker Lite
|-
|-
|c2s_bytes
|spam_blocker_lite_action
|From-Client Bytes
|Spam Blocker Lite Action
|bigint
|character(1)
|The number of bytes the client sent
|The action taken by Spam Blocker Lite
|-
|-
|s2c_bytes
|spam_blocker_score
|From-Server Bytes
|Spam Blocker Score
|bigint
|real
|The number of bytes the server sent
|The score of the email according to Spam Blocker
|-
|-
|start_time
|spam_blocker_is_spam
|Start Time
|Spam Blocker Spam
|timestamp without time zone
|boolean
|The start time of the session
|The spam status of the email according to Spam Blocker
|-
|-
|end_time
|spam_blocker_tests_string
|End Time
|Spam Blocker Tests
|timestamp without time zone
|text
|The time the session ended
|The tess results for Spam Blocker
|-
|-
|bypassed
|spam_blocker_action
|Bypassed
|Spam Blocker Action
|boolean
|character(1)
|True if the session was bypassed, false otherwise
|The action taken by Spam Blocker
|-
|phish_blocker_score
|Phish Blocker Score
|real
|The score of the email according to Phish Blocker
|-
|-
|entitled
|phish_blocker_is_spam
|Entitled
|Phish Blocker Phish
|boolean
|boolean
|True if the session is entitled to premium functionality
|The phish status of the email according to Phish Blocker
|-
|-
|protocol
|phish_blocker_tests_string
|Protocol
|Phish Blocker Tests
|smallint
|text
|The IP protocol of session
|The tess results for Phish Blocker
|-
|-
|icmp_type
|phish_blocker_action
|ICMP Type
|Phish Blocker Action
|smallint
|character(1)
|The ICMP type of session if ICMP
|The action taken by Phish Blocker
|-
|-
|hostname
|}
|Hostname
<section end='mail_msgs' />
|text
()
|The hostname of the local address
 
== mail_addrs ==
<section begin='mail_addrs' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|username
|time_stamp
|Username
|Timestamp
|text
|timestamp without time zone
|The username associated with this session
|The time of the event
|-
|-
|policy_id
|session_id
|Policy ID
|Session ID
|smallint
|bigint
|The policy
|The session
|-
|-
|policy_rule_id
|client_intf
|Policy Rule ID
|Client Interface
|smallint
|smallint
|The ID of the matching policy rule (0 means none)
|The client interface
|-
|-
|local_addr
|server_intf
|Local Address
|Server Interface
|inet
|smallint
|The IP address of the local participant
|The server interface
|-
|remote_addr
|Remote Address
|inet
|The IP address of the remote participant
|-
|-
|c_client_addr
|c_client_addr
Line 1,935: Line 2,027:
|inet
|inet
|The client-side client IP address
|The client-side client IP address
|-
|s_client_addr
|Server-side Client Address
|inet
|The server-side client IP address
|-
|-
|c_server_addr
|c_server_addr
Line 1,941: Line 2,038:
|The client-side server IP address
|The client-side server IP address
|-
|-
|c_server_port
|s_server_addr
|Client-side Server Port
|Server-side Server Address
|integer
|inet
|The client-side server port
|The server-side server IP address
|-
|-
|c_client_port
|c_client_port
Line 1,951: Line 2,048:
|The client-side client port
|The client-side client port
|-
|-
|s_client_addr
|s_client_port
|Server-side Client Address
|Server-side Client Port
|inet
|integer
|The server-side client IP address
|The server-side client port
|-
|-
|s_server_addr
|c_server_port
|Server-side Server Address
|Client-side Server Port
|inet
|integer
|The server-side server IP address
|The client-side server port
|-
|-
|s_server_port
|s_server_port
Line 1,966: Line 2,063:
|The server-side server port
|The server-side server port
|-
|-
|s_client_port
|policy_id
|Server-side Client Port
|Policy ID
|integer
|bigint
|The server-side client port
|The policy
|-
|-
|client_intf
|username
|Client Interface
|Username
|smallint
|text
|The client interface
|The username associated with this session
|-
|-
|server_intf
|msg_id
|Server Interface
|Message ID
|smallint
|bigint
|The server interface
|The message ID
|-
|-
|client_country
|subject
|Client Country
|Subject
|text
|text
|The client Country
|The email subject
|-
|-
|client_latitude
|addr
|Client Latitude
|Address
|real
|text
|The client Latitude
|The address of this event
|-
|-
|client_longitude
|addr_name
|Client Longitude
|Address Name
|real
|The client Longitude
|-
|server_country
|Server Country
|text
|text
|The server Country
|The name for this address
|-
|-
|server_latitude
|addr_kind
|Server Latitude
|Address Kind
|real
|character(1)
|The server Latitude
|The type for this address (F=From, T=To, C=CC, G=Envelope From, B=Envelope To, X=Unknown)
|-
|hostname
|Hostname
|text
|The hostname of the local address
|-
|-
|server_longitude
|event_id
|Server Longitude
|Event ID
|real
|bigint
|The server Longitude
|The unique event ID
|-
|-
|filter_prefix
|sender
|Filter Block
|Sender
|text
|text
|The network filter that blocked the connection
|The address of the sender
|-
|-
|firewall_blocked
|virus_blocker_lite_clean
|Firewall Blocked
|Virus Blocker Lite Clean
|boolean
|boolean
|True if Firewall blocked the session, false otherwise
|The cleanliness of the file according to Virus Blocker Lite
|-
|-
|firewall_flagged
|virus_blocker_lite_name
|Firewall Flagged
|Virus Blocker Lite Name
|text
|The name of the malware according to Virus Blocker Lite
|-
|virus_blocker_clean
|Virus Blocker Clean
|boolean
|boolean
|True if Firewall flagged the session, false otherwise
|The cleanliness of the file according to Virus Blocker
|-
|-
|firewall_rule_index
|virus_blocker_name
|Firewall Rule ID
|Virus Blocker Name
|integer
|The matching rule in Firewall (if any)
|-
|application_control_lite_protocol
|Application Control Lite Protocol
|text
|text
|The application protocol according to Application Control Lite
|The name of the malware according to Virus Blocker
|-
|-
|application_control_lite_blocked
|spam_blocker_lite_score
|Application Control Lite Blocked
|Spam Blocker Lite Score
|boolean
|real
|True if Application Control Lite blocked the session
|The score of the email according to Spam Blocker Lite
|-
|-
|captive_portal_blocked
|spam_blocker_lite_is_spam
|Captive Portal Blocked
|Spam Blocker Lite Spam
|boolean
|boolean
|True if Captive Portal blocked the session
|The spam status of the email according to Spam Blocker Lite
|-
|-
|captive_portal_rule_index
|spam_blocker_lite_action
|Captive Portal Rule ID
|Spam Blocker Lite Action
|integer
|character(1)
|The matching rule in Captive Portal (if any)
|The action taken by Spam Blocker Lite
|-
|-
|application_control_application
|spam_blocker_lite_tests_string
|Application Control Application
|Spam Blocker Lite Tests
|text
|text
|The application according to Application Control
|The tess results for Spam Blocker Lite
|-
|-
|application_control_protochain
|spam_blocker_score
|Application Control Protochain
|Spam Blocker Score
|text
|real
|The protochain according to Application Control
|The score of the email according to Spam Blocker
|-
|-
|application_control_category
|spam_blocker_is_spam
|Application Control Category
|Spam Blocker Spam
|text
|The category according to Application Control
|-
|application_control_blocked
|Application Control Blocked
|boolean
|boolean
|True if Application Control blocked the session
|The spam status of the email according to Spam Blocker
|-
|-
|application_control_flagged
|spam_blocker_action
|Application Control Flagged
|Spam Blocker Action
|boolean
|character(1)
|True if Application Control flagged the session
|The action taken by Spam Blocker
|-
|spam_blocker_tests_string
|Spam Blocker Tests
|text
|The tess results for Spam Blocker
|-
|-
|application_control_confidence
|phish_blocker_score
|Application Control Confidence
|Phish Blocker Score
|integer
|real
|True if Application Control confidence of this session's identification
|The score of the email according to Phish Blocker
|-
|-
|application_control_ruleid
|phish_blocker_is_spam
|Application Control Rule ID
|Phish Blocker Phish
|integer
|boolean
|The matching rule in Application Control (if any)
|The phish status of the email according to Phish Blocker
|-
|-
|application_control_detail
|phish_blocker_tests_string
|Application Control Detail
|Phish Blocker Tests
|text
|text
|The text detail from the Application Control engine
|The tess results for Phish Blocker
|-
|-
|bandwidth_control_priority
|phish_blocker_action
|Bandwidth Control Priority
|Phish Blocker Action
|integer
|character(1)
|The priority given to this session
|The action taken by Phish Blocker
|-
|bandwidth_control_rule
|Bandwidth Control Rule ID
|integer
|The matching rule in Bandwidth Control rule (if any)
|-
|ssl_inspector_ruleid
|SSL Inspector Rule ID
|integer
|The matching rule in SSL Inspector rule (if any)
|-
|ssl_inspector_status
|SSL Inspector Status
|text
|The status/action of the SSL session (INSPECTED/IGNORED/BLOCKED/UNTRUSTED/ABANDONED)
|-
|ssl_inspector_detail
|SSL Inspector Detail
|text
|Additional text detail about the SSL connection (SNI, IP Address)
|-
|-
|}
|}
<section end='session_minutes' />
<section end='mail_addrs' />
()


 
== ftp_events ==  
== penaltybox ==  
<section begin='ftp_events' />
<section begin='penaltybox' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 2,129: Line 2,206:
!Description
!Description
|-
|-
|address
|event_id
|Address
|Event ID
|inet
|bigint
|The IP address of the host
|The unique event ID
|-
|reason
|Reason
|text
|The reason for the action
|-
|start_time
|Start Time
|timestamp without time zone
|The time the client entered the penalty box
|-
|end_time
|End Time
|timestamp without time zone
|The time the client exited the penalty box
|-
|-
|time_stamp
|time_stamp
Line 2,154: Line 2,216:
|The time of the event
|The time of the event
|-
|-
|}
|session_id
<section end='penaltybox' />
|Session ID
 
|bigint
 
|The session
== quotas ==
|-
<section begin='quotas' />
|client_intf
 
|Client Interface
{| border="1" cellpadding="2" width="90%%" align="center"
|smallint
!Column Name
|The client interface
!Human Name
!Type
!Description
|-
|-
|time_stamp
|server_intf
|Timestamp
|Server Interface
|timestamp without time zone
|smallint
|The time of the event
|The server interface
|-
|-
|address
|c_client_addr
|Address
|Client-side Client Address
|inet
|inet
|The IP address of the host
|The client-side client IP address
|-
|-
|action
|s_client_addr
|Action
|Server-side Client Address
|integer
|inet
|The action (1=Quota Given, 2=Quota Exceeded)
|The server-side client IP address
|-
|-
|size
|c_server_addr
|Size
|Client-side Server Address
|inet
|The client-side server IP address
|-
|s_server_addr
|Server-side Server Address
|inet
|The server-side server IP address
|-
|policy_id
|Policy ID
|bigint
|bigint
|The size of the quota
|The policy
|-
|username
|Username
|text
|The username associated with this session
|-
|-
|reason
|hostname
|Reason
|Hostname
|text
|text
|The reason for the action
|The hostname of the local address
|-
|-
|}
|request_id
<section end='quotas' />
|Request ID
 
|bigint
 
|The FTP request ID
== host_table_updates ==
<section begin='host_table_updates' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|-
|address
|method
|Address
|Method
|inet
|character(1)
|The IP address of the host
|The FTP method
|-
|-
|key
|uri
|Key
|URI
|text
|text
|The key being updated
|The FTP URI
|-
|virus_blocker_lite_clean
|Virus Blocker Lite Clean
|boolean
|The cleanliness of the file according to Virus Blocker Lite
|-
|-
|value
|virus_blocker_lite_name
|Value
|Virus Blocker Lite Name
|text
|text
|The new value for the key
|The name of the malware according to Virus Blocker Lite
|-
|-
|time_stamp
|virus_blocker_clean
|Timestamp
|Virus Blocker Clean
|timestamp without time zone
|boolean
|The time of the event
|The cleanliness of the file according to Virus Blocker
|-
|virus_blocker_name
|Virus Blocker Name
|text
|The name of the malware according to Virus Blocker
|-
|-
|}
|}
<section end='host_table_updates' />
<section end='ftp_events' />
 
()


== device_table_updates ==  
== tunnel_vpn_events ==  
<section begin='device_table_updates' />
<section begin='tunnel_vpn_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 2,238: Line 2,314:
!Description
!Description
|-
|-
|mac_address
|event_id
|MAC Address
|Event ID
|bigint
|The unique event ID
|-
|time_stamp
|Timestamp
|timestamp without time zone
|The time of the event
|-
|tunnel_name
|Tunnel Name
|text
|text
|The MAC address of the device
|The name the tunnel
|-
|-
|key
|server_address
|Key
|Server IP Address
|text
|text
|The key being updated
|The address of the remote server
|-
|-
|value
|local_address
|Value
|Local Address
|text
|text
|The new value for the key
|The local address assigned the client
|-
|-
|time_stamp
|event_type
|Timestamp
|Event Type
|timestamp without time zone
|text
|The time of the event
|The type of the event (CONNECT,DISCONNECT)
|-
|-
|}
|}
<section end='device_table_updates' />
<section end='tunnel_vpn_events' />
 
()


== alerts ==  
== tunnel_vpn_stats ==  
<section begin='alerts' />
<section begin='tunnel_vpn_stats' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 2,276: Line 2,362:
|The time of the event
|The time of the event
|-
|-
|description
|tunnel_name
|Text detail of the event
|Tunnel Name
|text
|text
|The description from the alert rule.
|The name of the Tunnel VPN tunnel
|-
|-
|summary_text
|in_bytes
|Summary Text
|In Bytes
|text
|bigint
|The summary text of the alert
|The number of bytes received during this time frame
|-
|-
|json
|out_bytes
|JSON Text
|Out Bytes
|text
|bigint
|The summary JSON representation of the event causing the alert
|The number of bytes transmitted during this time frame
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|-
|}
|}
<section end='alerts' />
<section end='tunnel_vpn_stats' />
()


 
== wan_failover_test_events ==  
== configuration_backup_events ==  
<section begin='wan_failover_test_events' />
<section begin='configuration_backup_events' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 2,309: Line 2,400:
|The time of the event
|The time of the event
|-
|-
|success
|interface_id
|Success
|Interface ID
|boolean
|integer
|The result of the backup (true if the backup succeeded, false otherwise)
|This interface ID
|-
|name
|Interface Name
|text
|This name of the interface
|-
|-
|description
|description
|Text detail of the event
|Text detail of the event
|text
|text
|Text detail of the event
|The description from the test rule
|-
|-
|destination
|success
|Destination
|Success
|text
|boolean
|The location of the backup
|The result of the test (true if the test succeeded, false otherwise)
|-
|-
|event_id
|event_id
Line 2,330: Line 2,426:
|-
|-
|}
|}
<section end='configuration_backup_events' />
<section end='wan_failover_test_events' />
()


 
== wan_failover_action_events ==  
== settings_changes ==  
<section begin='wan_failover_action_events' />
<section begin='settings_changes' />


{| border="1" cellpadding="2" width="90%%" align="center"
{| border="1" cellpadding="2" width="90%%" align="center"
Line 2,347: Line 2,443:
|The time of the event
|The time of the event
|-
|-
|settings_file
|interface_id
|Settings File
|Interface ID
|integer
|This interface ID
|-
|action
|Action
|text
|text
|The name of the file changed
|This action (CONNECTED,DISCONNECTED)
|-
|-
|username
|os_name
|Username
|Interface O/S Name
|text
|text
|The username logged in at the time of the change
|This O/S name of the interface
|-
|-
|hostname
|name
|Hostname
|Interface Name
|text
|text
|The remote hostname
|This name of the interface
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|-
|}
|}
<section end='settings_changes' />
<section end='wan_failover_action_events' />
()
 
== directory_connector_login_events ==
<section begin='directory_connector_login_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|time_stamp
|Timestamp
|timestamp without time zone
|The time of the event
|-
|login_name
|Login Name
|text
|The login name
|-
|domain
|Domain
|text
|The AD domain
|-
|type
|Type
|text
|The type of event (I=Login,U=Update,O=Logout)
|-
|client_addr
|Client Address
|inet
|The client IP address
|-
|login_type
|Login Type
|text
|The login type
|-
|}
<section end='directory_connector_login_events' />
()
 
== captive_portal_user_events ==
<section begin='captive_portal_user_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|time_stamp
|Timestamp
|timestamp without time zone
|The time of the event
|-
|policy_id
|Policy ID
|bigint
|The policy
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|login_name
|Login Name
|text
|The login username
|-
|event_info
|Event Type
|text
|The type of event (LOGIN, FAILED, TIMEOUT, INACTIVE, USER_LOGOUT, ADMIN_LOGOUT)
|-
|auth_type
|Authorization Type
|text
|The authorization type for this event
|-
|client_addr
|Client Address
|text
|The remote IP address of the client
|-
|}
<section end='captive_portal_user_events' />
()
 
== openvpn_stats ==
<section begin='openvpn_stats' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|time_stamp
|Timestamp
|timestamp without time zone
|The time of the event
|-
|start_time
|Start Time
|timestamp without time zone
|The time the OpenVPN session started
|-
|end_time
|End Time
|timestamp without time zone
|The time the OpenVPN session ended
|-
|rx_bytes
|Bytes Received
|bigint
|The total bytes received from the client during this session
|-
|tx_bytes
|Bytes Sent
|bigint
|The total bytes sent to the client during this session
|-
|remote_address
|Remote Address
|inet
|The remote IP address of the client
|-
|pool_address
|Pool Address
|inet
|The pool IP address of the client
|-
|remote_port
|Remote Port
|integer
|The remote port of the client
|-
|client_name
|Client Name
|text
|The name of the client
|-
|event_id
|Event ID
|bigint
|The unique event ID
|-
|}
<section end='openvpn_stats' />
()
 
== openvpn_events ==
<section begin='openvpn_events' />
 
{| border="1" cellpadding="2" width="90%%" align="center"
!Column Name
!Human Name
!Type
!Description
|-
|time_stamp
|Timestamp
|timestamp without time zone
|The time of the event
|-
|remote_address
|Remote Address
|inet
|The remote IP address of the client
|-
|pool_address
|Pool Address
|inet
|The pool IP address of the client
|-
|client_name
|Client Name
|text
|The name of the client
|-
|type
|Type
|text
|The type of the event (CONNECT,DISCONNECT)
|-
|}
<section end='openvpn_events' />
()

Latest revision as of 18:37, 8 September 2020

Database Tables

configuration_backup_events

<section begin='configuration_backup_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
success Success boolean The result of the backup (true if the backup succeeded, false otherwise)
description Text detail of the event text Text detail of the event
destination Destination text The location of the backup
event_id Event ID bigint The unique event ID

<section end='configuration_backup_events' /> ()

http_events

<section begin='http_events' />

Column Name Human Name Type Description
request_id Request ID bigint The HTTP request ID
time_stamp Timestamp timestamp without time zone The time of the event
session_id Session ID bigint The session
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
c_client_addr Client-side Client Address inet The client-side client IP address
s_client_addr Server-side Client Address inet The server-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
s_server_addr Server-side Server Address inet The server-side server IP address
c_client_port Client-side Client Port integer The client-side client port
s_client_port Server-side Client Port integer The server-side client port
c_server_port Client-side Server Port integer The client-side server port
s_server_port Server-side Server Port integer The server-side server port
client_country Client Country text The client Country
client_latitude Client Latitude real The client Latitude
client_longitude Client Longitude real The client Longitude
server_country Server Country text The server Country
server_latitude Server Latitude real The server Latitude
server_longitude Server Longitude real The server Longitude
policy_id Policy ID smallint The policy
username Username text The username associated with this session
hostname Hostname text The hostname of the local address
method Method character(1) The HTTP method
uri URI text The HTTP URI
host Host text The HTTP host
domain Domain text The HTTP domain (shortened host)
referer Referer text The Referer URL
c2s_content_length Client-to-server Content Length bigint The client-to-server content length
s2c_content_length Server-to-client Content Length bigint The server-to-client content length
s2c_content_type Server-to-client Content Type text The server-to-client content type
s2c_content_filename Server-to-client Content Disposition Filename text The server-to-client content disposition filename
ad_blocker_cookie_ident Ad Blocker Cookie text This name of cookie blocked by Ad Blocker
ad_blocker_action Ad Blocker Action character(1) This action of Ad Blocker on this request
web_filter_reason Reason for action (Web Filter) character(1) This reason Web Filter blocked/flagged this request
web_filter_category_id Web Category (Web Filter) smallint This numeric category according to Web Filter
web_filter_rule_id Web Rule (Web Filter) smallint This numeric rule according to Web Filter
web_filter_blocked Blocked (Web Filter) boolean If Web Filter blocked this request
web_filter_flagged Flagged (Web Filter) boolean If Web Filter flagged this request
virus_blocker_lite_clean Virus Blocker Lite Clean boolean The cleanliness of the file according to Virus Blocker Lite
virus_blocker_lite_name Virus Blocker Lite Name text The name of the malware according to Virus Blocker Lite
virus_blocker_clean Virus Blocker Clean boolean The cleanliness of the file according to Virus Blocker
virus_blocker_name Virus Blocker Name text The name of the malware according to Virus Blocker
threat_prevention_blocked Threat Prevention Blocked boolean If Threat Prevention blocked this request
threat_prevention_flagged Threat Prevention Flagged boolean If Threat Prevention flagged this request
threat_prevention_rule_id Threat Prevention Rule Id integer This numeric rule according to Threat Prevention
threat_prevention_reputation Threat Prevention Reputation smallint This numeric threat reputation
threat_prevention_categories Threat Prevention Categories integer This bitmask of threat categories

<section end='http_events' /> ()

intrusion_prevention_events

<section begin='intrusion_prevention_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
sig_id Signature ID bigint This ID of the rule
gen_id Grouping ID bigint The grouping ID for the rule, The gen_id + sig_id specify the rule's unique identifier
class_id Classtype ID bigint The numeric ID for the classtype
source_addr Source Address inet The source IP address of the packet
source_port Source Port integer The source port of the packet (if applicable)
dest_addr Destination Address inet The destination IP address of the packet
dest_port Destination Port integer The destination port of the packet (if applicable)
protocol Protocol integer The protocol of the packet
blocked Blocked boolean If the packet was blocked/dropped
category Category text The application specific grouping for the signature
classtype Classtype text The generalized threat signature grouping (unrelated to gen_id)
msg Message text The "title" or "description" of the signature
rid Rule ID text The rule id
rule_id Rule ID text The rule id

<section end='intrusion_prevention_events' /> ()

smtp_tarpit_events

<section begin='smtp_tarpit_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
ipaddr Client Address inet The client IP address
hostname Hostname text The hostname of the local address
policy_id Policy ID bigint The policy
vendor_name Vendor Name character varying(255) The "vendor name" of the app that logged the event
event_id Event ID bigint The unique event ID

<section end='smtp_tarpit_events' /> ()

ipsec_user_events

<section begin='ipsec_user_events' />

Column Name Human Name Type Description
event_id Event ID bigint The unique event ID
time_stamp Timestamp timestamp without time zone The time of the event
connect_stamp Connect Time timestamp without time zone The time the connection started
goodbye_stamp End Time timestamp without time zone The time the connection ended
client_address Client Address text The remote IP address of the client
client_protocol Client Protocol text The protocol the client used to connect
client_username Client Username text The username of the client
net_process Net Process text The PID of the PPP process for L2TP connections or the connection ID for Xauth connections
net_interface Net Interface text The PPP interface for L2TP connections or the client interface for Xauth connections
elapsed_time Elapsed Time text The total time the client was connected
rx_bytes Bytes Received bigint The number of bytes received from the client in this connection
tx_bytes Bytes Sent bigint The number of bytes sent to the client in this connection

<section end='ipsec_user_events' /> ()

ipsec_vpn_events

<section begin='ipsec_vpn_events' />

Column Name Human Name Type Description
event_id Event ID bigint The unique event ID
time_stamp Timestamp timestamp without time zone The time of the event
local_address Local Address text The local address of the tunnel
remote_address Remote Address text The remote address of the tunnel
tunnel_description Tunnel Description text The description of the tunnel
event_type Event Type text The type of the event (CONNECT,DISCONNECT)

<section end='ipsec_vpn_events' /> ()

ipsec_tunnel_stats

<section begin='ipsec_tunnel_stats' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
tunnel_name Tunnel Name text The name of the IPsec tunnel
in_bytes In Bytes bigint The number of bytes received during this time frame
out_bytes Out Bytes bigint The number of bytes transmitted during this time frame
event_id Event ID bigint The unique event ID

<section end='ipsec_tunnel_stats' /> ()

http_query_events

<section begin='http_query_events' />

Column Name Human Name Type Description
event_id Event ID bigint The unique event ID
time_stamp Timestamp timestamp without time zone The time of the event
session_id Session ID bigint The session
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
c_client_addr Client-side Client Address inet The client-side client IP address
s_client_addr Server-side Client Address inet The server-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
s_server_addr Server-side Server Address inet The server-side server IP address
c_client_port Client-side Client Port integer The client-side client port
s_client_port Server-side Client Port integer The server-side client port
c_server_port Client-side Server Port integer The client-side server port
s_server_port Server-side Server Port integer The server-side server port
policy_id Policy ID bigint The policy
username Username text The username associated with this session
hostname Hostname text The hostname of the local address
request_id Request ID bigint The HTTP request ID
method Method character(1) The HTTP method
uri URI text The HTTP URI
term Search Term text The search term
host Host text The HTTP host
c2s_content_length Client-to-server Content Length bigint The client-to-server content length
s2c_content_length Server-to-client Content Length bigint The server-to-client content length
s2c_content_type Server-to-client Content Type text The server-to-client content type
blocked Blocked boolean If Web Filter blocked this search term
flagged Flagged boolean If Web Filter flagged this search term

<section end='http_query_events' /> ()

admin_logins

<section begin='admin_logins' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
login Login text The login name
local Local boolean True if it is a login attempt through a local process
client_addr Client Address inet The client IP address
succeeded Succeeded boolean True if the login succeeded, false otherwise
reason Reason character(1) The reason for the login (if applicable)

<section end='admin_logins' /> ()

sessions

<section begin='sessions' />

Column Name Human Name Type Description
session_id Session ID bigint The session
time_stamp Timestamp timestamp without time zone The time of the event
end_time End Time timestamp without time zone The time the session ended
bypassed Bypassed boolean True if the session was bypassed, false otherwise
entitled Entitled boolean True if the session is entitled to premium functionality
protocol Protocol smallint The IP protocol of session
icmp_type ICMP Type smallint The ICMP type of session if ICMP
hostname Hostname text The hostname of the local address
username Username text The username associated with this session
policy_id Policy ID smallint The policy
policy_rule_id Policy Rule ID smallint The ID of the matching policy rule (0 means none)
local_addr Local Address inet The IP address of the local participant
remote_addr Remote Address inet The IP address of the remote participant
c_client_addr Client-side Client Address inet The client-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
c_server_port Client-side Server Port integer The client-side server port
c_client_port Client-side Client Port integer The client-side client port
s_client_addr Server-side Client Address inet The server-side client IP address
s_server_addr Server-side Server Address inet The server-side server IP address
s_server_port Server-side Server Port integer The server-side server port
s_client_port Server-side Client Port integer The server-side client port
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
client_country Client Country text The client Country
client_latitude Client Latitude real The client Latitude
client_longitude Client Longitude real The client Longitude
server_country Server Country text The server Country
server_latitude Server Latitude real The server Latitude
server_longitude Server Longitude real The server Longitude
c2p_bytes From-Client Bytes bigint The number of bytes the client sent to Untangle (client-to-pipeline)
p2c_bytes To-Client Bytes bigint The number of bytes Untangle sent to client (pipeline-to-client)
s2p_bytes From-Server Bytes bigint The number of bytes the server sent to Untangle (client-to-pipeline)
p2s_bytes To-Server Bytes bigint The number of bytes Untangle sent to server (pipeline-to-client)
filter_prefix Filter Block text The network filter that blocked the connection (filter,shield,invalid)
firewall_blocked Firewall Blocked boolean True if Firewall blocked the session, false otherwise
firewall_flagged Firewall Flagged boolean True if Firewall flagged the session, false otherwise
firewall_rule_index Firewall Rule ID integer The matching rule in Firewall (if any)
threat_prevention_blocked Threat Prevention Blocked boolean If Threat Prevention blocked
threat_prevention_flagged Threat Prevention Flagged boolean If Threat Prevention flagged
threat_prevention_reason Threat Prevention Reason character(1) Threat Prevention reason
threat_prevention_rule_id Threat Prevention Rule Id integer Numeric rule id of Threat Prevention
threat_prevention_client_reputation Threat Prevention Client Reputation smallint Numeric client reputation of Threat Prevention
threat_prevention_client_categories Threat Prevention Client Categories integer Bitmask client categories of Threat Prevention
threat_prevention_server_reputation Threat Prevention Server Reputation smallint Numeric server reputation of Threat Prevention
threat_prevention_server_categories Threat Prevention Server Categories integer Bitmask server categories of Threat Prevention
application_control_lite_protocol Application Control Lite Protocol text The application protocol according to Application Control Lite
application_control_lite_blocked Application Control Lite Blocked boolean True if Application Control Lite blocked the session
captive_portal_blocked Captive Portal Blocked boolean True if Captive Portal blocked the session
captive_portal_rule_index Captive Portal Rule ID integer The matching rule in Captive Portal (if any)
application_control_application Application Control Application text The application according to Application Control
application_control_protochain Application Control Protochain text The protochain according to Application Control
application_control_category Application Control Category text The category according to Application Control
application_control_blocked Application Control Blocked boolean True if Application Control blocked the session
application_control_flagged Application Control Flagged boolean True if Application Control flagged the session
application_control_confidence Application Control Confidence integer True if Application Control confidence of this session's identification
application_control_ruleid Application Control Rule ID integer The matching rule in Application Control (if any)
application_control_detail Application Control Detail text The text detail from the Application Control engine
bandwidth_control_priority Bandwidth Control Priority integer The priority given to this session
bandwidth_control_rule Bandwidth Control Rule ID integer The matching rule in Bandwidth Control rule (if any)
ssl_inspector_ruleid SSL Inspector Rule ID integer The matching rule in SSL Inspector rule (if any)
ssl_inspector_status SSL Inspector Status text The status/action of the SSL session (INSPECTED,IGNORED,BLOCKED,UNTRUSTED,ABANDONED)
ssl_inspector_detail SSL Inspector Detail text Additional text detail about the SSL connection (SNI, IP Address)
tags Tags text The tags on this session

<section end='sessions' /> ()

session_minutes

<section begin='session_minutes' />

Column Name Human Name Type Description
session_id Session ID bigint The session
time_stamp Timestamp timestamp without time zone The time of the event
c2s_bytes From-Client Bytes bigint The number of bytes the client sent
s2c_bytes From-Server Bytes bigint The number of bytes the server sent
start_time Start Time timestamp without time zone The start time of the session
end_time End Time timestamp without time zone The time the session ended
bypassed Bypassed boolean True if the session was bypassed, false otherwise
entitled Entitled boolean True if the session is entitled to premium functionality
protocol Protocol smallint The IP protocol of session
icmp_type ICMP Type smallint The ICMP type of session if ICMP
hostname Hostname text The hostname of the local address
username Username text The username associated with this session
policy_id Policy ID smallint The policy
policy_rule_id Policy Rule ID smallint The ID of the matching policy rule (0 means none)
local_addr Local Address inet The IP address of the local participant
remote_addr Remote Address inet The IP address of the remote participant
c_client_addr Client-side Client Address inet The client-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
c_server_port Client-side Server Port integer The client-side server port
c_client_port Client-side Client Port integer The client-side client port
s_client_addr Server-side Client Address inet The server-side client IP address
s_server_addr Server-side Server Address inet The server-side server IP address
s_server_port Server-side Server Port integer The server-side server port
s_client_port Server-side Client Port integer The server-side client port
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
client_country Client Country text The client Country
client_latitude Client Latitude real The client Latitude
client_longitude Client Longitude real The client Longitude
server_country Server Country text The server Country
server_latitude Server Latitude real The server Latitude
server_longitude Server Longitude real The server Longitude
filter_prefix Filter Block text The network filter that blocked the connection (filter,shield,invalid)
firewall_blocked Firewall Blocked boolean True if Firewall blocked the session, false otherwise
firewall_flagged Firewall Flagged boolean True if Firewall flagged the session, false otherwise
firewall_rule_index Firewall Rule ID integer The matching rule in Firewall (if any)
threat_prevention_blocked Threat Prevention Blocked boolean If Threat Prevention blocked
threat_prevention_flagged Threat Prevention Flagged boolean If Threat Prevention flagged
threat_prevention_reason Threat Prevention Reason character(1) Threat Prevention reason
threat_prevention_rule_id Threat Prevention Rule Id integer Numeric rule id of Threat Prevention
threat_prevention_client_reputation Threat Prevention Client Reputation smallint Numeric client reputation of Threat Prevention
threat_prevention_client_categories Threat Prevention Client Categories integer Bitmask client categories of Threat Prevention
threat_prevention_server_reputation Threat Prevention Server Reputation smallint Numeric server reputation of Threat Prevention
threat_prevention_server_categories Threat Prevention Server Categories integer Bitmask server categories of Threat Prevention
application_control_lite_protocol Application Control Lite Protocol text The application protocol according to Application Control Lite
application_control_lite_blocked Application Control Lite Blocked boolean True if Application Control Lite blocked the session
captive_portal_blocked Captive Portal Blocked boolean True if Captive Portal blocked the session
captive_portal_rule_index Captive Portal Rule ID integer The matching rule in Captive Portal (if any)
application_control_application Application Control Application text The application according to Application Control
application_control_protochain Application Control Protochain text The protochain according to Application Control
application_control_category Application Control Category text The category according to Application Control
application_control_blocked Application Control Blocked boolean True if Application Control blocked the session
application_control_flagged Application Control Flagged boolean True if Application Control flagged the session
application_control_confidence Application Control Confidence integer True if Application Control confidence of this session's identification
application_control_ruleid Application Control Rule ID integer The matching rule in Application Control (if any)
application_control_detail Application Control Detail text The text detail from the Application Control engine
bandwidth_control_priority Bandwidth Control Priority integer The priority given to this session
bandwidth_control_rule Bandwidth Control Rule ID integer The matching rule in Bandwidth Control rule (if any)
ssl_inspector_ruleid SSL Inspector Rule ID integer The matching rule in SSL Inspector rule (if any)
ssl_inspector_status SSL Inspector Status text The status/action of the SSL session (INSPECTED,IGNORED,BLOCKED,UNTRUSTED,ABANDONED)
ssl_inspector_detail SSL Inspector Detail text Additional text detail about the SSL connection (SNI, IP Address)
tags Tags text The tags on this session

<section end='session_minutes' /> ()

quotas

<section begin='quotas' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
entity Entity text The IP entity given the quota (address/username)
action Action integer The action (1=Quota Given, 2=Quota Exceeded)
size Size bigint The size of the quota
reason Reason text The reason for the action

<section end='quotas' /> ()

host_table_updates

<section begin='host_table_updates' />

Column Name Human Name Type Description
address Address inet The IP address of the host
key Key text The key being updated
value Value text The new value for the key
old_value Old Value text The old value for the key
time_stamp Timestamp timestamp without time zone The time of the event

<section end='host_table_updates' /> ()

device_table_updates

<section begin='device_table_updates' />

Column Name Human Name Type Description
mac_address MAC Address text The MAC address of the device
key Key text The key being updated
value Value text The new value for the key
old_value Old Value text The old value for the key
time_stamp Timestamp timestamp without time zone The time of the event

<section end='device_table_updates' /> ()

user_table_updates

<section begin='user_table_updates' />

Column Name Human Name Type Description
username Username text The username
key Key text The key being updated
value Value text The new value for the key
old_value Old Value text The old value for the key
time_stamp Timestamp timestamp without time zone The time of the event

<section end='user_table_updates' /> ()

alerts

<section begin='alerts' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
description Text detail of the event text The description from the alert rule.
summary_text Summary Text text The summary text of the alert
json JSON Text text The summary JSON representation of the event causing the alert

<section end='alerts' /> ()

settings_changes

<section begin='settings_changes' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
settings_file Settings File text The name of the file changed
username Username text The username logged in at the time of the change
hostname Hostname text The remote hostname

<section end='settings_changes' /> ()

web_cache_stats

<section begin='web_cache_stats' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
hits Hits bigint The number of cache hits during this time frame
misses Misses bigint The number of cache misses during this time frame
bypasses Bypasses bigint The number of cache user bypasses during this time frame
systems System bypasses bigint The number of cache system bypasses during this time frame
hit_bytes Hit Bytes bigint The number of bytes saved from cache hits
miss_bytes Miss Bytes bigint The number of bytes not saved from cache misses
event_id Event ID bigint The unique event ID

<section end='web_cache_stats' /> ()

server_events

<section begin='server_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
load_1 CPU load (1-min) numeric(6,2) The 1-minute CPU load
load_5 CPU load (5-min) numeric(6,2) The 5-minute CPU load
load_15 CPU load (15-min) numeric(6,2) The 15-minute CPU load
cpu_user CPU User Utilization numeric(6,3) The user CPU percent utilization
cpu_system CPU System Utilization numeric(6,3) The system CPU percent utilization
mem_total Total Memory bigint The total bytes of memory
mem_free Memory Free bigint The number of free bytes of memory
disk_total Disk Size bigint The total disk size in bytes
disk_free Disk Free bigint The free disk space in bytes
swap_total Swap Size bigint The total swap size in bytes
swap_free Swap Free bigint The free disk swap in bytes
active_hosts Active Hosts integer The number of active hosts

<section end='server_events' /> ()

interface_stat_events

<section begin='interface_stat_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
interface_id Interface ID integer The interface ID
rx_rate Rx Rate double precision The RX rate (bytes/s)
rx_bytes Bytes Received bigint The number of bytes received from the client in this connection
tx_rate Tx Rate double precision The TX rate (bytes/s)
tx_bytes Bytes Sent bigint The number of bytes sent to the client in this connection

<section end='interface_stat_events' /> ()

mail_msgs

<section begin='mail_msgs' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
session_id Session ID bigint The session
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
c_client_addr Client-side Client Address inet The client-side client IP address
s_client_addr Server-side Client Address inet The server-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
s_server_addr Server-side Server Address inet The server-side server IP address
c_client_port Client-side Client Port integer The client-side client port
s_client_port Server-side Client Port integer The server-side client port
c_server_port Client-side Server Port integer The client-side server port
s_server_port Server-side Server Port integer The server-side server port
policy_id Policy ID bigint The policy
username Username text The username associated with this session
msg_id Message ID bigint The message ID
subject Subject text The email subject
hostname Hostname text The hostname of the local address
event_id Event ID bigint The unique event ID
sender Sender text The address of the sender
receiver Receiver text The address of the receiver
virus_blocker_lite_clean Virus Blocker Lite Clean boolean The cleanliness of the file according to Virus Blocker Lite
virus_blocker_lite_name Virus Blocker Lite Name text The name of the malware according to Virus Blocker Lite
virus_blocker_clean Virus Blocker Clean boolean The cleanliness of the file according to Virus Blocker
virus_blocker_name Virus Blocker Name text The name of the malware according to Virus Blocker
spam_blocker_lite_score Spam Blocker Lite Score real The score of the email according to Spam Blocker Lite
spam_blocker_lite_is_spam Spam Blocker Lite Spam boolean The spam status of the email according to Spam Blocker Lite
spam_blocker_lite_tests_string Spam Blocker Lite Tests text The tess results for Spam Blocker Lite
spam_blocker_lite_action Spam Blocker Lite Action character(1) The action taken by Spam Blocker Lite
spam_blocker_score Spam Blocker Score real The score of the email according to Spam Blocker
spam_blocker_is_spam Spam Blocker Spam boolean The spam status of the email according to Spam Blocker
spam_blocker_tests_string Spam Blocker Tests text The tess results for Spam Blocker
spam_blocker_action Spam Blocker Action character(1) The action taken by Spam Blocker
phish_blocker_score Phish Blocker Score real The score of the email according to Phish Blocker
phish_blocker_is_spam Phish Blocker Phish boolean The phish status of the email according to Phish Blocker
phish_blocker_tests_string Phish Blocker Tests text The tess results for Phish Blocker
phish_blocker_action Phish Blocker Action character(1) The action taken by Phish Blocker

<section end='mail_msgs' /> ()

mail_addrs

<section begin='mail_addrs' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
session_id Session ID bigint The session
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
c_client_addr Client-side Client Address inet The client-side client IP address
s_client_addr Server-side Client Address inet The server-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
s_server_addr Server-side Server Address inet The server-side server IP address
c_client_port Client-side Client Port integer The client-side client port
s_client_port Server-side Client Port integer The server-side client port
c_server_port Client-side Server Port integer The client-side server port
s_server_port Server-side Server Port integer The server-side server port
policy_id Policy ID bigint The policy
username Username text The username associated with this session
msg_id Message ID bigint The message ID
subject Subject text The email subject
addr Address text The address of this event
addr_name Address Name text The name for this address
addr_kind Address Kind character(1) The type for this address (F=From, T=To, C=CC, G=Envelope From, B=Envelope To, X=Unknown)
hostname Hostname text The hostname of the local address
event_id Event ID bigint The unique event ID
sender Sender text The address of the sender
virus_blocker_lite_clean Virus Blocker Lite Clean boolean The cleanliness of the file according to Virus Blocker Lite
virus_blocker_lite_name Virus Blocker Lite Name text The name of the malware according to Virus Blocker Lite
virus_blocker_clean Virus Blocker Clean boolean The cleanliness of the file according to Virus Blocker
virus_blocker_name Virus Blocker Name text The name of the malware according to Virus Blocker
spam_blocker_lite_score Spam Blocker Lite Score real The score of the email according to Spam Blocker Lite
spam_blocker_lite_is_spam Spam Blocker Lite Spam boolean The spam status of the email according to Spam Blocker Lite
spam_blocker_lite_action Spam Blocker Lite Action character(1) The action taken by Spam Blocker Lite
spam_blocker_lite_tests_string Spam Blocker Lite Tests text The tess results for Spam Blocker Lite
spam_blocker_score Spam Blocker Score real The score of the email according to Spam Blocker
spam_blocker_is_spam Spam Blocker Spam boolean The spam status of the email according to Spam Blocker
spam_blocker_action Spam Blocker Action character(1) The action taken by Spam Blocker
spam_blocker_tests_string Spam Blocker Tests text The tess results for Spam Blocker
phish_blocker_score Phish Blocker Score real The score of the email according to Phish Blocker
phish_blocker_is_spam Phish Blocker Phish boolean The phish status of the email according to Phish Blocker
phish_blocker_tests_string Phish Blocker Tests text The tess results for Phish Blocker
phish_blocker_action Phish Blocker Action character(1) The action taken by Phish Blocker

<section end='mail_addrs' /> ()

ftp_events

<section begin='ftp_events' />

Column Name Human Name Type Description
event_id Event ID bigint The unique event ID
time_stamp Timestamp timestamp without time zone The time of the event
session_id Session ID bigint The session
client_intf Client Interface smallint The client interface
server_intf Server Interface smallint The server interface
c_client_addr Client-side Client Address inet The client-side client IP address
s_client_addr Server-side Client Address inet The server-side client IP address
c_server_addr Client-side Server Address inet The client-side server IP address
s_server_addr Server-side Server Address inet The server-side server IP address
policy_id Policy ID bigint The policy
username Username text The username associated with this session
hostname Hostname text The hostname of the local address
request_id Request ID bigint The FTP request ID
method Method character(1) The FTP method
uri URI text The FTP URI
virus_blocker_lite_clean Virus Blocker Lite Clean boolean The cleanliness of the file according to Virus Blocker Lite
virus_blocker_lite_name Virus Blocker Lite Name text The name of the malware according to Virus Blocker Lite
virus_blocker_clean Virus Blocker Clean boolean The cleanliness of the file according to Virus Blocker
virus_blocker_name Virus Blocker Name text The name of the malware according to Virus Blocker

<section end='ftp_events' /> ()

tunnel_vpn_events

<section begin='tunnel_vpn_events' />

Column Name Human Name Type Description
event_id Event ID bigint The unique event ID
time_stamp Timestamp timestamp without time zone The time of the event
tunnel_name Tunnel Name text The name the tunnel
server_address Server IP Address text The address of the remote server
local_address Local Address text The local address assigned the client
event_type Event Type text The type of the event (CONNECT,DISCONNECT)

<section end='tunnel_vpn_events' /> ()

tunnel_vpn_stats

<section begin='tunnel_vpn_stats' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
tunnel_name Tunnel Name text The name of the Tunnel VPN tunnel
in_bytes In Bytes bigint The number of bytes received during this time frame
out_bytes Out Bytes bigint The number of bytes transmitted during this time frame
event_id Event ID bigint The unique event ID

<section end='tunnel_vpn_stats' /> ()

wan_failover_test_events

<section begin='wan_failover_test_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
interface_id Interface ID integer This interface ID
name Interface Name text This name of the interface
description Text detail of the event text The description from the test rule
success Success boolean The result of the test (true if the test succeeded, false otherwise)
event_id Event ID bigint The unique event ID

<section end='wan_failover_test_events' /> ()

wan_failover_action_events

<section begin='wan_failover_action_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
interface_id Interface ID integer This interface ID
action Action text This action (CONNECTED,DISCONNECTED)
os_name Interface O/S Name text This O/S name of the interface
name Interface Name text This name of the interface
event_id Event ID bigint The unique event ID

<section end='wan_failover_action_events' /> ()

directory_connector_login_events

<section begin='directory_connector_login_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
login_name Login Name text The login name
domain Domain text The AD domain
type Type text The type of event (I=Login,U=Update,O=Logout)
client_addr Client Address inet The client IP address
login_type Login Type text The login type

<section end='directory_connector_login_events' /> ()

captive_portal_user_events

<section begin='captive_portal_user_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
policy_id Policy ID bigint The policy
event_id Event ID bigint The unique event ID
login_name Login Name text The login username
event_info Event Type text The type of event (LOGIN, FAILED, TIMEOUT, INACTIVE, USER_LOGOUT, ADMIN_LOGOUT)
auth_type Authorization Type text The authorization type for this event
client_addr Client Address text The remote IP address of the client

<section end='captive_portal_user_events' /> ()

openvpn_stats

<section begin='openvpn_stats' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
start_time Start Time timestamp without time zone The time the OpenVPN session started
end_time End Time timestamp without time zone The time the OpenVPN session ended
rx_bytes Bytes Received bigint The total bytes received from the client during this session
tx_bytes Bytes Sent bigint The total bytes sent to the client during this session
remote_address Remote Address inet The remote IP address of the client
pool_address Pool Address inet The pool IP address of the client
remote_port Remote Port integer The remote port of the client
client_name Client Name text The name of the client
event_id Event ID bigint The unique event ID

<section end='openvpn_stats' /> ()

openvpn_events

<section begin='openvpn_events' />

Column Name Human Name Type Description
time_stamp Timestamp timestamp without time zone The time of the event
remote_address Remote Address inet The remote IP address of the client
pool_address Pool Address inet The pool IP address of the client
client_name Client Name text The name of the client
type Type text The type of the event (CONNECT,DISCONNECT)

<section end='openvpn_events' /> ()