Linux Audit Logs: Map event_id to ocsf.metadata.uid#23184
Linux Audit Logs: Map event_id to ocsf.metadata.uid#23184nbeckstead-ddog merged 2 commits intomasterfrom
Conversation
|
This PR does not modify any files shipped with the agent. To help streamline the release process, please consider adding the |
cepolation-datadog
left a comment
There was a problem hiding this comment.
The event_id isn't a correlation uid. A correlation_uid is something that ties together several events, like in a session. This should map to ocsf.metadata.event_code https://schema.ocsf.io/1.5.0/objects/metadata
I don't think |
What does this PR do?
Maps the auditd
event_idfield toocsf.metadata.correlation_uidacross all OCSF sub-pipelines in the Linux Audit Logs integration.Motivation
Detection rules correlate related audit records (e.g. SYSCALL + PATH events) using
@event_id.metadata.correlation_uidis the OCSF-standard field for this purpose — its description is "The unique identifier used to correlate events," which matches exactly how auditd usesevent_idto group related record types within a single audit event.