Key |
Value |
Usage |
---|---|---|
|
The domain (pod name) of the event source (Source name). |
In all events |
|
One of the following IP addresses in an IPv4 network (Source IP Address):
|
|
|
Description of the Reason of the Error status. |
In all events with the Error status, except |
|
One of the following artifact types (Artifact name):
|
|
|
The name of the user that initiated the action (Source username) |
|
|
Name of the user with which the action was performed (Destination username) |
|
|
Process identifier (PID) |
|
|
Parent process identifier (PPID) |
|
|
Effective Group Identifier (EGID) |
|
Security policy type (Policy type) |
|
|
Report name |
|
|
Danger level of the detected object (Detect danger level) |
|
|
Node monitoring |
|
|
|
Container ID |
|
Policy name |
|
|
Application scope name |
|
|
|
Return Value |
|
Type of integration with image signature validators (Image sign validator type) |
|
|
|
Names of related policies that were applied to detect the incident while investigating of security events (Related policies) |
|
Name of integration with image signature validators (Image sign validator name) |
|
|
|
Execution status or mode (Status) The value is defined as follows:
|
In all events |
|
Image name |
|
|
Image digest |
|
|
One of the following operation types (Action):
|
|
|
Source port |
|
|
IP address of the destination in the IPv4 network (Destination IP) |
|
|
Destination port |
|
|
Process name (command) |
|
|
One of the following parameters:
|
|
|
One of the following permission sets (
|
|
|
Previously used file path (Old File Path) |
|
|
Path to the file (Path) For events involving access to objects in the file system of a container, |
|
|
Connection type (Traffic type) 0 for ingress connections, 1 for egress connections. |
|
|
New process identifier (New PID) |
|
Total number of events of the selected type on the node per minute (Total events per minute) |
|
|
|
The number of events lost on the node per minute (Lost events amount) |
|
|
Percentage of events lost over a minute (Lost events percentage) |
|
|
Cluster name |
|
Role name |
|
|
Name of the accepted risk (Risk name) |
|
|
Scanner name |
|
|
Path that the user accessed (End point) |
|
|
|
Node name |
|
User that initiated the change (RBAC initiator) |
|
|
Name of the LDAP group that the user belongs to (Active Directory group name) |
|
|
Scan job ID applied by the scanner (Job ID) |
|
|
|
Namespace name |
|
Name of the modified repository (Repository name) |
|
|
Name of the triggered benchmark rule (Benchmark name) |
|
|
Name of the terminal through which the login attempt was made (TTY) |
|
|
Agent name |
|
|
Component name |
|
|
|
Executed command (Command) |
|
Information about the new owner (New owner) |
|
|
Information about the groups of the initiator (Initiator groups) |
|
|
Name of the image registry (Registry name) |
|
|
Mode of the file interceptor that is enabled in the settings of the File Threat Protection component in the Container Runtime Profile (File interceptor mode) |
|
|
Command from the command line (cmd) for a sudo operation (Operation). |
|
|
|
Pod name |
|
Type of integration with outputs (Integration type) |
|
|
|
Container name |
|
Integration name |
|
|
|
Node IP |
|
Address of the connected LDAP server (Server name) |
|
|
|
Unique Kaspersky Container Security instance ID (KСS ID) KCS ID does not change when the pod is changed. |
In all events, except |
|
Event ID in ClickHouse (Event ID) |
In all events, except |
|
Name of the detected malware (Malware name) |
|
|
Type of the detected malware (Malware type) |
|
|
MD5 hash of the malicious file (File hash (MD5)) |
|
|
SHA256 hash of the malicious file (File hash (SHA256)) |
|
|
Name of the event category within the File Threat Protection component (Event category) |
|
|
ID of the user that launched the malicious file (Owner ID) |
|
|
ID of the object detected by the File Threat Protection component (Object ID) |
|
|
Initiator of an operation with a container (Operation initiator) |
|
|
Type of the object with which the event occurred (Object type) |
|
|
Whether the container has privileged access to all objects on the host device (Privileged) |
|
|
Whether writing to the root file system of the container is prohibited (ReadonlyRootfs) |
|
|
Mounted directories of the container (Mounted volumes) |
|
|
Associated ports that allow forwarding traffic from a port on a host device to a port of the container (Exposed ports) |
|
|
Maximum functionality set that can be assigned to a process or container, or used by a process or container (Bounding capabilities) |
|
|
Set of functionality available to a process or container (Effective capabilities) |
|
|
Set of functionality inherited by processes from their parent process (Inheritable capabilities) |
|
|
Functionality that defines the capabilities potentially available to the process (Permitted capabilities) |
|
|
Event date |
In all events, except |
|
Expiration date of accepted risk (Expiration date) |
|
|
Authorization method in the host OS (Connection method) |
|
|
Protocol (SSH, TELNET, RDP) used for authorization in the host OS (Application protocol) |
|