Esm Acc Userguide
Esm Acc Userguide
User's Guide
Legal Notices
Copyright Notice
© Copyright 2001-2021 Micro Focus or one of its affiliates
Confidential computer software. Valid license from Micro Focus required for possession, use or copying. The
information contained herein is subject to change without notice.
The only warranties for Micro Focus products and services are set forth in the express warranty statements
accompanying such products and services. Nothing herein should be construed as constituting an additional warranty.
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein.
No portion of this product's documentation may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose other
than the purchaser's internal use, without the express written permission of Micro Focus.
Notwithstanding anything to the contrary in your license agreement for Micro Focus ArcSight software, you may
reverse engineer and modify certain open source components of the software in accordance with the license terms for
those particular components. See below for the applicable terms.
U.S. Governmental Rights. For purposes of your license to Micro Focus ArcSight software, “commercial computer
software” is defined at FAR 2.101. If acquired by or on behalf of a civilian agency, the U.S. Government acquires this
commercial computer software and/or commercial computer software documentation and other technical data subject
to the terms of the Agreement as specified in 48 C.F.R. 12.212 (Computer Software) and 12.211 (Technical Data) of the
Federal Acquisition Regulation (“FAR”) and its successors. If acquired by or on behalf of any agency within the
Department of Defense (“DOD”), the U.S. Government acquires this commercial computer software and/or commercial
computer software documentation subject to the terms of the Agreement as specified in 48 C.F.R. 227.7202-3 of the
DOD FAR Supplement (“DFARS”) and its successors. This U.S. Government Rights Section 18.11 is in lieu of, and
supersedes, any other FAR, DFARS, or other clause or provision that addresses government rights in computer software
or technical data.
Trademark Notices
Adobe™ is a trademark of Adobe Systems Incorporated.
Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation.
UNIX® is a registered trademark of The Open Group.
Support
Contact Information
Phone A list of phone numbers is available on the Technical Support
Page: https://softwaresupport.softwaregrp.com/support-contact-information
Page 3 of 231
User's Guide
Page 4 of 231
User's Guide
Search Operators 82
Time Range 82
Fieldsets 84
Creating Custom Field Sets 85
Constraints 86
Using the Advanced Search Tool 95
Accessing Advanced Search 95
Nested Conditions 97
Alternate Views for Query Building in Advanced Search 98
Search Helper 99
Autocomplete 100
Search History 101
Search Operator History 101
Examples 101
Usage 102
Suggested Next Operators 102
Help 102
Searching for Events 102
Granting Access to Search Operations and Event Filters 104
Advanced Search Options 105
Searching Peers (Distributed Search) 105
Tuning Search Performance 105
Understanding the Search Results Display 106
User-defined Fields in Search Results 108
Viewing Search Results Using Fieldsets 108
Using the Histogram 109
Multi-line Data Display 110
Auto Updating Search Results 110
Chart Drill Down 111
Field Summary 111
Understanding Field Summary 112
Refining and Charting a Search from Field Summary 114
Adding Search Results to a Case 116
Exporting Search Results 116
Example PDF output 118
Scheduling an Export Operation 119
Saved Queries (Search Filters and Saved Searches) 120
Page 5 of 231
User's Guide
Page 6 of 231
User's Guide
Page 7 of 231
User's Guide
Page 8 of 231
User's Guide
Page 9 of 231
User's Guide
What happens if I'm investigating a channel that has event fields that are not
supported in Command Center? 227
Can I change the default start time and end time for an event channel? 227
What do I do if a channel is taking long to load? 228
How many channels can I have open at one time? 228
What fields are supported in Command Center channels? 228
Does Command Center support non-ASCII payload data? 229
How do I get my ArcSight Marketplace credentials? 229
Why are channels not current in a new ESM session? 229
Does the change to or from Daylight Savings Time effect an open active channel? 229
Why does the right end of the top menu bar appear overlapped? 230
Page 10 of 231
Chapter 1: Welcome to the ArcSight
Command Center
The ArcSight Command Center is a web-based user interface that enables you to perform many
of the functions found in the ArcSight Console. ArcSight Command Center provides dashboards,
several kinds of searches, reports, case management, notifications, and administrative
functions for managing active channels, content, connectors, storage, archives, search filters,
saved searches, peer configuration, and system logs.
Note: Host names with underscores do not work on Microsoft Internet Explorer, so use the IP
address.
Note: If you use OSP Client Only Authentication in your environment, you might experience an
issue where logging out of ArcSight Command Center does not log you out. Instead, your session
will return you to the main ArcSight Command Center landing page and you remain logged in.
This occurs when the IdP session timeout setting is larger than the OSP timeout setting.
Micro Focus recommends closing your browser after you log out of ArcSight Command Center.
General Prerequisites
l If the Manager is using FIPS, then configure your browser to use TLS.
l If you are using FIPS and SSL, use the keytool command to export a client certificate for
the browser machine.
l If you are not using FIPS, export certificates with the keytoolgui command. For more
information, see the ESM Administrator's Guide.
Logging in with Password Authentication
Log in with your User ID and password. Your user type controls your resource access.
Logging in with SSL Authentication
Make sure you have exported a client certificate from an ArcSight Console. Specify the
certificate to use and click OK. When you get to the Command Center user ID and Password
screen, click Login without specifying anything.
Logging in with Password Authentication or SSL
To log in with an SSL certificate, make sure you have exported a client certificate from an
ArcSight Console machine. Specify the certificate to use, and click OK. When you get to the
Command Center User ID and Password screen, leave the fields blank and click Login .
To log in with a user ID and password, click Cancel on the certificate dialog, then provide your
user ID and password on the User ID and Password screen.
Note: If you are using Microsoft Internet Explorer, and you import a certificate, you must always
use SSL (cancelling fails to load the page). If you do not import a certificate, you can only use
password authentication.
Make sure you have exported a client certificate from an ArcSight Console machine. Specify the
certificate to use and click OK. When you get to the User ID and Password screen, specify your
User ID and password.
Note: While logging into a Manager that has been configured to use Password-based or SSL
Client Based authentication, if you try to log in using a certificate and the login fails, all
subsequent attempts to use the username/password login will also fail during the same session.
To work around this, restart the browser and clear its cache.
Basic Navigation
Use the Dashboards, Channels, Cases, Reports, Resources, Administration, License, and User
links at the left of the display to go to those features. Click each one to display a menu of
available options.
The links in the upper right corner provide these features:
l Dark Theme: Changes the Command Center display from the default light to dark theme.
The dark theme reduces glare from the screen, providing visual comfort in dark room
environments.
l Notifications: Displays pending notifications.
l Help
Click Help to get context-sensitive help for the page you are viewing.
The help for those applications is accessible from the Help link when you view the
integrated application from the Applications tab. Such help has its own appearance and
navigation.
Hover over the Help link to see a list of options:
o What’s New: Displays the online help system, open to a list of new features in this
release.
o Documentation: Displays the main online documentation page, with a description of
each book and a table of contents in the left panel.
o Online Support: Takes you to the online support web site in a separate window.
o About: Displays the current ESM product version number.
l Site Map: Provides a mechanism to access Command Center primary landing pages using
keyboard-navigation only.
You are considered to be in compliance with the license agreement as long as the MMEPS
values remain at or below the purchased licensed capacity. You are considered to be in
violation of the license agreement if three or more consecutive MMEPS values exceed the
purchased license capacity.
To view the usage metrics, click License > License Usage in the menu bar.
The usage metrics that ESM displays are a result of the following calculations:
l Events per day (EPD)
EPD is the total number of events that are generated in a 24-hour period. The 24-hour
period is based on UTC time. It starts at 00:00:00 and ends at 23:59:59, regardless of local
time.
EPD calculations vary according to the version of SmartConnectors in use. If the
SmartConnector version is greater than 7.13.0, ESM counts post-filter and pre-aggregation
events from connectors. If the SmartConnector version is 7.13.0 or lower, ESM counts post-
filter and post-aggregation events from connectors.
l Sustained events per second (SEPS)
SEPS is the constant events per second that the system sustained within the 24-hour
period. The calculation normalizes peaks and valleys and provides a better indication of
usage. ESM uses the following formula to calculate SEPS:
(EPD/((60*60)*24))
l 45-day moving median (MMEPS)
ESM uses the SEPS calculations per day to identify the MMEPS value. ESM uses a 45-day
data set to calculate the median value and shifts the calculation window one day every 24
hours after the first 45 days. The 24-hour period is based on UTC time. It starts at 00:00:00
and ends at 23:59:59, regardless of local time.
Because ESM does not yet have enough SEPS calculations to calculate MMEPS for the first
45 days of usage, it displays approximate MMEPS values. As the number of days increases,
the approximate MMEPS becomes a more accurate indication of the actual MMEPS.
For example:
o On day 2, the MMEPS value is the SEPS value for day 1.
o On day 3, the MMEPS value is the average of the SEPS values for days 1 and 2.
o On day 4, the MMEPS value is the average of the SEPS values for days 1, 2, and 3.
o The pattern continues until day 46, when ESM has 45 SEPS values for calculating the
actual MMEPS.
ESM displays approximate values in gray to distinguish them from actual values.
ESM must be running for at least one day before it displays usage metrics. If you click Stats on
day 0, ESM generates a message that it did not receive any results from the server.
After ESM begins collecting data, when you click License Usage, ESM displays the usage metrics
in a bar chart and in a table. For example:
Because MMEPS calculations are approximate values for the first 45 days, ESM does not
calculate license violations during this time.
If ESM calculates a license violation on a particular day and you then increase the licensed
capacity, the increase does not affect the previous license violation.
o My Dashboards
o My Notifications
l System information:
o Data Monitor
o Query Viewer
l MITRE ATT&CK information:
o Last MITRE ATTK&CK Events
o MITRE by Tactic
o Top 10 Attackers
o Top 10 Targets
o Last 10 Attacks and Suspicious Activity Events
o Top Indicator Type in Suspicious Address
By default, a new installation displays the following dashlets;
l Last MITRE ATTK&CK Events
l MITRE by Tactic
l Top 10 Attackers
l Top 10 Targets
l Last 10 Attacks and Suspicious Activity Events
l Top Indicator Type in Suspicious Address
l My Cases
Note: You can customize the look of a data monitor and query viewer dashlets in the Dashboard
Navigator page (see "Managing Dashboards in the Dashboard Navigator Page" on page 23).
Prerequisite:
l Create one or more data monitors in ArcSight Console.
Procedure:
Location: Dashboards > Home
1. Click Add Content.
2. From the Add Content to Home popup, select Data Monitors.
3. Navigate to the data monitor folder containing the desired data monitor.
4. Select the desired data monitor in the Name column and then click Add Content.
5. Add any additional data monitors and then close the popup.
6. To change a data monitor view, make a selection from the available drop-down in the data
monitor title bar.
Note: Not all chart options that are supported in the ArcSight Console are available in the
Command Center.
More:
l Available data monitor views vary based on the data monitor type.
See Also:
l ESM 101
l ArcSight Console User's Guide
Note: The My Cases dashlet does not display assigned cases if these cases are assigned to only to
a group. To access these cases, go to the Cases area of the ArcSight Command Center, as
described in the chapter "Cases" on page 130.
Procedure:
Location: Dashboards > Home
1. Click Add Content.
2. From the Add Content to Home popup, select My Cases and then click Add Content.
Command Center displays the cases assigned to you.
3. Close the popup.
More:
l The link in the My Cases dashlet title bar opens the Cases page where you can see the list
of cases, create new ones, and perform other functions. This is the same as selecting Cases.
l If you would like to add an existing case to your personal folder, go to the ArcSight Console,
edit the case, and then add yourself as the owner in the Assign section.
See Also:
l "Cases" on page 130
l ESM 101
l ArcSight Console User's Guide
Procedure:
Location: Dashboards > Home
1. Click Add Content.
2. From the Add Content to Home popup, select Dashboards and then click Add Content.
Command Center displays the list of dashboards that are in your personal folder.
More:
l You can also see the list of dashboards under Dashboards > Navigator, along with all the
other dashboards.
l Use the ArcSight Console to create dashboards under your personal folder.
l The link in the My Dashboards widget title bar opens the Dashboard Navigator where you
can see the list of dashboards created in the ArcSight Console. This is the same as selecting
Dashboards > Navigator.
l If you would like to add another dashboard to your personal folder, go to the ArcSight
Console and drag it into your folder.
l Access Recon from a dashboard by clicking on a field name and selecting Recon. The fields
that enable this access must be supported Recon fields. Not all ESM fields are supported
for search in Recon. These unsupported fields are disabled for selection in a Recon search.
Note: The Target Address and Attacker Address fields have no Recon option.
If the field you are searching is empty, the Recon popup automatically uses =",'None as
the search condition. For example, for an empty deviceVendor field, the search statement
in Recon is
deviceVendor =",'None
See Also:
l Viewing System Information
l ArcSight Console User's Guide
Procedure:
Location: Dashboards > Home
1. Click Add Content.
2. From the Add Content to Home popup, select My Notifications and then click Add
Content.
Command Center displays the list of notifications that are in your personal folder.
Rearrange ArcSight Command Center Dashboard If Charts and Tables Overlap Page 21 of 231
User's Guide
Chapter 2: Viewing System Information
More:
l The link in the My Notifications dashlet title bar opens the Notifications page where all the
notifications are listed.
l You can also click the Notifications button in the upper right corner to open the
Notifications page. The number of pending notifications are indicated within a red circle.
l By default, the My Notifications dashlet is filtered by the Pending, Acknowledged and
Resolved statuses of the Notifications page.
l From the Notifications page you can:
o Adjust the filter that controls which notifications appear
o Acknowledge notifications
o Mark notifications as resolved
o Delete notifications
l Notifications are configured in the ArcSight Console. For more information, see the
ArcSight Console User's Guide.
Procedure:
Location: Dashboards > Home
1. Click Add Content.
2. From the Add Content to Home popup, select Query Viewers.
3. Navigate to the query viewer folder containing the desired query viewer.
4. Select the desired query viewer in the Name column and then click Add Content.
5. Add any additional query viewers and then close the popup.
More:
Query viewers use specific types of queries, and some are not supported. Depending on the
query used, not all query viewers are displayed.
Query viewers are available in the Command Center in tabular and chart formats. For charts,
the x and y axes display only aggregated fields (such as count).
Query viewers displaying bar charts support only aggregated fields in the bar chart's y-axis and
z-axis.
See Also:
ArcSight Console User's Guide
Procedure:
Location: Dashboards > Home
l Click Change Layout and specify the number of columns to display.
More:
l You can reposition widgets using drag and drop.
See Also:
l ESM 101
l ArcSight Console User's Guide
Note: If a resource changes on the ArcSight Console that you are displaying in the Command
Center Dashboard Navigator page, you will have to refresh your view of the Dashboard Navigator
to be able to see the changes.
Prerequisite:
l Create one or more data monitors or query viewers in ArcSight Console in a dashboard.
For more information, see the ArcSight Console User's Guide.
Procedure:
Location: Dashboard menu > Navigator > Dashboard - list screen >resource tree
1. Click Dashboard > Navigator.
2. Expand the dashboard folder in the resource tree and then click the desired folder.
Dashboards associated with the folder appear in a table in the center of the screen, as
seen in the following example of dashboards listed in the navigator. Click
to change the columns in the table listing the dashboards. Click
4. If you have multiple dashboards open, these will appear in tabs, as seen in the following
example.
Click Tab View to change the dashboard view to show dashlets in individual tabs, as shown
in the following example. You can click the various tabs to view each tab.
Click Tab View to change back to the tiled view of the dashboards.
Procedure:
1. Add a data monitor, per steps in "Adding a Data Monitor Dashlet to the Dashboards Page"
on page 18
2. In a dashboard data monitor dashlet, right-click in a data display (for example, right-click in
a segment of a pie chart).
3. Select Create Channel, and enter a name for the channel. This will create and display a
temporary channel.
4. Click Save As to save the channel as a resource that you can access again.
Note: Some data monitors do not support navigation directly to a channel. These are:
l Asset Category Count
l Event Correlation
l System Monitor
l System Monitor Attribute
l Rules Partial Match
Also, some of fields are not supported for drilldown. These include:
l Data Viewer fields
l Aggregated fields
Procedure:
Location: Dashboards > Navigator
1. In the upper right corner of the dashboard page dashlet, select a chart type from the icon
choices. The chart type currently displayed is highlighted in green.
2. Click the icon again to change the chart type, or return to the original view of a chart.
More:
The available view options vary based on the dashlet type, and other selections made when it
was created in the ArcSight Console. They might show different kinds of charts, if the data
monitor can be displayed in those formats. Below are the possible data presentation formats.
Dashlet Types
Display
Format Description
Bar Chart Shows data as a series of proportional bar elements and may include bar segmentation to
subdivide the data.
Applies to data monitors and query viewers.
Horizontal Bar Shows data as a series of proportional bar elements and may include bar segmentation to
Chart subdivide the data. This format forces the bars to run left-to-right rather than up-and-down.
Applies to data monitors and query viewers.
Pie Chart or Do Shows data as a circle with proportional wedges for elements and a hole in the middle.
Nut Chart
Applies to data monitors and query viewers.
Statistics Chart Overlays Moving Average data graphs on a data monitor, when multiple graphs are present.
Compare this display format to the Tiles format, which arranges individual-graph monitors into
fixed arrays.
Applies to data monitors.
Stacking Bar Shows data from a query viewer as a series of proportional bar elements and may include bar
Chart segmentation to subdivide the data.
Geographical Shows a map of the world with lines connecting the origin and destination of each event. You can
Event Map zoom in and hover over individual events for details.
Applies to geographical event graphs.
Event Graph Displays the event endpoints like nodes on a spider web. You can hover over individual events
endpoints for details.
Topology A variation of the Event Graph that displays event endpoints in relation to each other, in terms of
Graph Source Nodes, Event Nodes, and Target Nodes. This graph allows you to explore the relationships
and connections among the nodes. Hover over a node to highlight that node's connections. Click
individual nodes to drill down and explore the relationships among the nodes.
You can pause auto-refresh so that data will stop updating and remain stable during an
investigation. Click play to restart data update.
Right-click on any individual node to copy node information to the clipboard; you can use this data
later in filter, or for another purpose.
Note: You can configure a display limit for Event Graphs in the ArcSight Console. Depending on
your monitor size, you might have to adjust this value to yield usable data in the Topology Graph
view.
Points to consider:
l Charts may appear differently in the Command Center than they do in the ArcSight
Console. The default chart view in the Command Center is the bar chart.
l Not all chart options are available in the Command Center that are supported in the
ArcSight Console. For example, the 3D bar chart is not available in the Command Center,
and a regular bar chart will display instead.
l In the Command Center, the display limit for all charts is 20 entries. The grid view limit is
1000.
l Charts in the Command Center Dashboard navigator provide a view of charts, but do not
allow drilldown into the data; this is provided in the ArcSight Console.
l If you refresh the Dashboard Navigator view when displaying several dashboards, the
refreshed view will subsequently display the last dashboard viewed.
l You can use your browser's bookmark capability to bookmark a dashboard view. Use the
bookmark to log in and the bookmarked view will display.
l Right-click and copy is not available in Topology Graphs.
l For Topology Graphs, if the source node and attacker node are the same node, the source
and attacker nodes in this case are shown as separate nodes in the graph (are not depicted
as one node).
The data you choose is filtered out. Click again to turn the filter off and the filtered data is
again considered in the chart. This filtering persists only for the current session.
See Also:
ArcSight ConsoleUser's Guide:
Topic "Monitoring Events" > "Using Dashboards"
Procedure:
Location: Dashboards > Navigator
1. In the data monitor or query viewer dashlet, click the icon.
2. Follow any further prompts to save the data to a CSV file.
Note: The Safari browser blocks popups by default, and does not give notification that it does so.
You must enable popups in Safari for them to function.
Procedure:
1. Open the desired dashboard that includes a Last N Events data monitor.
2. Click an event row in the table.
3. Click the view details icon (magnifying glass).
4. View details in the Event Details popup.
From the Event Tree, select the desired event if multiple are present.
The Details tab of the Event Details popup shows attribute details related to the selected
event. You can also access Annotation History and Payload.
5. To filter event information based on fields, use the Show Fields Containing field.
6. To filter event information by field set, specify the desired field-set field.
Procedure:
Location: Dashboards > Cluster View
The screen displays these sections: Distributed Correlation Stats, Cluster, and a list of audit
events, either Live View of Audit Events (default view) or Backpressure History.
Users in the Analyzer Administrators group can access all the widgets on the dashboard by
default. All other users in non-administrator groups need read access to the following resource
groups
l /All Data Monitors/ArcSight Foundation/ArcSight ClusterView
l /All Filters/ArcSight Administration/ESM/Distributed Correlation Monitoring
l /All Fields/ArcSight Administration/ESM/Distributed Correlation Monitoring
Tip: The Legend button is in the far upper right corner of the window. You might have to scroll all
the way down and to the right to see it.
Cluster
Cluster shows Metrics, Services Configured , and Backpressure.
Metrics displayed are:
Note: Lag is shown as a metric on this dashboard. Lag indicates items waiting to be processed.
The lag numbers shown for correlators are for events per second (EPS). Those shown for
aggregators are messages per second.
View Audit Events shows the Live View of Audit Events, described below under "Audit Event
Lists " on page 35.
Services Configured is a summary of the total correlator and aggregator services configured for
the cluster. The count should match those on the cluster topology graph. It also indicates if the
services are running (Active) or (Stopped)
Backpressure enables you to control lag by throttling the EPS, based on acceptable lag, to
regulate event flow. It allows you to control the flow of events when there are more events
than the system can process. While backpressure is on, excess events are cached on the
connector. When backpressure is off, event flow resumes.
l Backpressure Mode:
o Auto: (automatic backpressure) is based on the value of Acceptable Lag. Backpressure
is turned on and off automatically to limit Estimated Lag to be less than Acceptable Lag.
Given the dynamic nature of message comsumption and message publishing rates, and
also latency in lag monitoring, the system cannot guarantee that Estimated Lag is never
more than the given value of Acceptable Lag. The system can only make a best effort.
Auto is the default setting for the backpressure mode, and is recommended. Auto is
overridden by On or Off, which you can use to toggle user backpressure:
o On: Stops all events. Events already accepted are processed and internal queues are
cleared. Use rarely if lag becomes too high and you need to temporarily stop event flow
to allow ESM to catch up.
o Off: Admits all events regardless of the specified Acceptable Lag. This option is no
longer available to select.
l Event Flow: ON indicates that events are flowing. OFF indicates events are stopped.
l Acceptable Lag: Use this value to provide a threshold for enabling backpressure. Values for
Acceptable Lag can be a number between 30 and 86400 (in seconds). Default is 180.
To modify the Acceptable Lag value, click the edit icon (pencil). Enter the value and click
OK.
l Estimated Lag: Calculated estimate based on EPS.
Click View History to show Backpressure History, described below under "Audit Event Lists "
on the next page.
aggregator l MPS In
l MPS Out
l c-to-a-dm Topic Lag
l c-to-a-rule Topic Lag
correlator l EPS In
l MPS Out
l p-to-c-events Topic Lag
l Rules Triggered with MITRE ID - stores MITRE ATT&CK information from correlation rules,
populated with correlation events which captured by the "Track Rules with Mitre ID" rule.
To view the MITRE Dashboard, go to Dashboards > MITRE.
For more information about active lists, see the ArcSight Console User's Guide.
The MITRE Dashboard provides the following views:
l MITRE Activity
l MITRE Coverage
MITRE Activity
The MITRE Activity view displays a visualization based on how many tactics and techniques the
“Rules Triggered with MITRE ID” list has observed over the last two days.
To see more information about an attack, click a technique. Each technique links to the MITRE
website, and displays the following information:
l Details for that technique, including the associated Tactic ID
l The rule that observed the attack
l The day the rule observed the attack
You can inspect a rule by clicking it, which opens a filtered channel specifically for that rule.
MITRE Coverage
The MITRE Coverage view is a customizable matrix that allows you to view one or more of the
following:
l Attacks identified in the last 2 days
l Technique actively monitored
l Coverage installed but not enabled
l No coverage installed
By default, the MITRE Coverage view displays all available information. Use the checkboxes to
display specific information.
Note:
l Some channels in Command Center may not be current when accessed in a new ESM
session. To ensure current event information, refresh the channel by clicking the stop and
play buttons.
l If an active channel is open when Daylight Savings Time goes into or out of effect, the active
channel will not reflect the correct start and end times until the channel is closed and re-
opened.
l The Country Flag URL is not displayed in active channel information for the Geo Active
Channel in the Command Center, but is displayed in the ArcSight Console.
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
1. Click Channels > Active Channels.
2. Expand the appropriate active channel folder in the resource tree and then click the
desired folder.
Channels associated with the folder appear in a table in the center of the screen, as seen in
the following example of active channels.
The Active Channel screen for the selected channel opens, displaying all the events for the
channel in the Event List tab. This is commonly known as the channel grid view.
If you have multiple channels open, these will appear in tabs, as seen in the following
typical view open channel tabs.
4. To add a specific field to the channel grid view, choose Customize > Fields.
l From the Select popup, select the desired field from the appropriate field set.
The Selected Fields list contains the fields that comprise the columns in the channel
grid view. You can click the left arrow button (! ) to remove any of these fields.
Use the up and down arrows in the Selected Fields list to sort the columns and control
the order in which the columns are displayed in the grid.
l Click OK.
The selected field appears as a column in the channel grid view, after the original
columns.
5. To add the fields of a field set to the channel grid view, choose Customize > Field Set.
l From the Select popup, select the desired field set.
The Selected Fields list contains the fields that comprise the columns in the channel
grid view. You can click the left arrow button (! ) to remove any of these fields.
l Click OK.
The fields appear as columns in the channel grid view, after the original columns.
Columns for the channel grid view are originally specified during the creation or edit of a
channel (see "Specifying Columns For the Active Channel Event List" on page 55).
Note:
l Some channels can be resource intensive, such as those with a time range of an hour or so.
If a channel takes long to load in a high-traffic environment, open this channels in the
ArcSight Console. To view a resource- intensive channel in ArcSight Command Center,
narrow the time range to 5 - 10 minutes to reduce the event volume.
l For optimum performance, limit open channels to 3 per browser, though ArcSight
Command Center can support up to 10 moderate-traffic channels or up to 15 light-traffic
channels per browser. Between ArcSight Command Center and ArcSight Console, ESM can
support up to 25 open channels.
l ArcSight Command Center does not support custom columns in the Event List (Channels >
Active Channels > Active Channel - list). If the channel has Custom Columns configured in
Console, these will not appear in Command Center.
Procedure:
1. Open the desired channel.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen, click Condition Summary.
3. From the Condition Summary popup, view the condition statements of the active channel.
Example of an active channel condition summary
The Condition Summary provides a read-only view of the channel condition so that you can
verify the syntax of the operators and their operands. For more information, see the ArcSight
Console User's Guide.
Access ArcSight Console to change any filter conditions.
Prerequisite:
Check to see that the nmap utility is installed on the client. Open a terminal or command
window and type:
nmap --version.
If nmap is installed, the version will be returned. If you get an error indicating that the
command is not recognized, download and install the nmap binary from http://nmap.org.
Procedure:
1. Open the desired channel and view the associated events.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen > Event List tab, click the desired event link.
For easier selection, click the pause button to freeze the Event List.
3. Identify an event, click on any field that contains an IP Address (such as Target Address,
Destination Address), and then select Tools from the extended menu. A popup displays the
Tools option.
4. Click Tools. From the Tools popup, click Download Tools Command Webapp.
You will be taken to ArcSight Marketplace.
5. Enter your ArcSight Marketplace login credentials.
If you do not have these credentials, contact Support.
If the download page does not display, go to
https://marketplace.microfocus.com/arcsight/content/tool-commands-web-app and
locate the ArcSight Tools Command Web App download link for your specific operating
system, and download the file to your local system. Unpack the file (either unzip or untar).
6. Change these default property values of the self-signed certificate in the
config.properties file:
ping.app.hostname=localhost
ping.app.port=3000
The authentication certificate is valid for ten years.
7. If you are on a Linux and Mac system, give root user execute permissions on the node
directory.
chmod +x node
Note: If your operating system does not provide Nmap, then download the utility.
12. To change the URL of the tool command panel, click the gear icon, re-enter the URL, and
then click Set.
13. To copy the contents of the tool command panel, click Select All in the tool command tab
(or select the text manually), and then copy and paste the content into the destination.
Note:
If you are using the Tool Commands utility with Internet Explorer or Microsoft Edge and get the
error "Content was blocked because it was not signed by a valid security certificate", perform
these steps to clear the error:
1. In Internet Explorer, go to Internet options > Security Tab > Trusted Sites > Sites button.
2. In the Trusted Sites dialog, add the Tool Commands URL to the list Websites (Add button),
then click Close.
3. Click OK to close the Internet Options dialog.
4. Open the Tool Commands URL in a separate tab. When prompted, click "Continue to this
website".
5. Click on the Certificate Error icon in the browser address bar, then select View Certificates.
6. In the Certificate dialog > General tab, click the Install Certificate button.
7. In Certificate Import Wizard, navigate to Next > Place all certificates in the following store
> Trusted Root Certification Authorities folder, and then click OK.
8. In the Security Warning dialog, click Yes. Close any open dialogs and return to Internet
Explorer by clicking OK.
9. In Internet Explorer, click Tools > Internet options. The Internet Options dialog opens.
10. Go to Advanced Tab and scroll to the end of the Settings list.
11. Uncheck the “Warn about certificate address mismatch*" setting, then click OK.
12. In Internet Explorer, reload the page to check the result. You should see the Tool
Commands Utility.
Procedure:
1. Open the desired channel and view the associated events.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen > Event List tab, click the desired event link.
3. Select Integration Command > <command>.
Note these limitations:
l Only Integration Commands of type URL are supported; when executed, the command URL
is launched in tab or new window based on browser preferences.
l The ability to save parameters to a user or a target is not supported in the context of the
Integration Commands.
Note: Be sure to have pop ups enabled for your browser. Recon opens in a separate browser
window.
Accessing Recon
The fields that enable Recon access must be supported Recon fields.
Procedure:
1. Open an active channel.
See "Viewing Events On an Active Channel" on page 38.
2. Right-click an event, select Integration Commands, and select Recon Search.
3. Click Recon Search (Single Field.)
The Recon browser window opens for single field search.
Or
1. Click Recon (Multiple Fields.)
The Recon pane opens and displays a list of supported fields for the search.
The list is based on the columns available in the channel.
Tip: Users may enter the field name in Search Fields, instead of scrolling through the list.
Enter the first few characters until the full name is displayed.
2. Drag and drop the fields from the Available Fields pane to the Selected Fields pane.
3. Select up to five fields.
4. Click Recon.
The Recon browser window opens for multiple fields search.
Note: Users might need to click 'allow the blocked pop-up' in order to open a browser for Recon
Search Login page.
Procedure:
1. Open the desired channel and view the associated events.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen Event List tab, click the desired event Name.
3. Click Integration Command(s) > Recon Search....
4. The Integration Commands popup displays. Select a command to determine your search,
such ass By Source and Destination, or By Vendor and Product.
5. Select a target implementation of Recon. For example, Recon 1.
6. Click OK. The Recon browser window opens.
If the previous steps are not performed in Configure target with target parameters, then,
you are prompted in another pop-up to enter the IP address for the Recon host. The pop-
up also shows the option to save the IP address parameter to the target. For more
information, see the ArcSight Console User's Guide.
Note: Users might need to click 'allow the blocked pop-up' in order to open a browser for Recon
Search Login page.
Note: On the Recon page, the time range for the search is the last 30 minutes by default, which
may not yield any search results. If necessary, edit the active channel by changing the Start Time
and End Time values for your search. See "Creating an Event Channel" on page 53 for details on
setting those values.
Name Indicates the resource type (active channel) and active channel name.
Time Span The Start Time and End Time show the chronological range of the channel.
Condition Displays the filter conditions defined for the channel. Filter conditions determine the amount of
Summary information to be displayed for events. Filters are either filter resources, in which case the URI to the
filter is also supplied; or in-line filter for the exclusive use of the active channel. For details about
filter resources, see the ArcSight Console User's Guide.
Priority Displays event priority statistic indicators and their corresponding event count.
Stats
For details about event priority scoring, see the ArcSight Console User's Guide.
Visualize Allows selection of up to four event fields (columns) on the channel to display in the graphical format
Events of widgets. The results are displayed in the "Visualize Events tab" on the next page. In the Select
button Fields to Visualize Events popup, drag and drop to move field names from Available Fields to Selected
Fields. Then click Visualize Events.
Selected The events within a time segment selected on the radar. If a segment is not selected, the value equals
Events Total Events. See "Using the Active Channel Radar" on the next page for details.
Radar A bar chart overview of events in the active channel. See "Using the Active Channel Radar" below for
display details.
operation
Visualize Created after you click Visualize Events and select the event fields (columns) to be rendered in the
Events tab graphical format of these widgets:
l Event Count
l Top 10 Row Chart for each selected event fields (up to four)
l Pie chart for the Priority event field
Note: You can access Recon from the Visualize Events tab by clicking supported Recon fields and
selecting Recon. Not all ESM fields are supported for search in Recon. These unsupported fields are
disabled for selection in a Recon search.
The Target Address and Attacker Address fields have no Recon option.
shown:
The selected time segment displays a handler widget. Depending on the location of the
selected segment, handler widgets for both left and right boundaries are displayed.
l To select multiple segments, contiguous or not, press Ctrl-click on the desired segments.
l To focus the grid on multiple contiguous segments, drag the right or left handler to select
more segments:
l To move a block of selected segments to a different area on the radar, drag the slider
under the selected radar segments the to the left or right along the radar:
The grid adjusts to display only the events within that segment. The Selected Events total
also adjusts to display only the count of events within that same segment.
l To restore the radar to display all events, press Ctrl-a.
The grid adjusts to display all events matching the count in Total Events (the default view).
Annotating an Event
About:
When annotating an event, you can change the stage, add comments, specify a user, and mark
the event as reviewed (see "Marking an Event as Reviewed" on page 69). You can only
annotate events to which you have permission.
Procedure:
1. Open the desired channel.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen > Event List tab, select the desired event and then click
Annotate.
For easier selection, click the pause button to freeze the Event List.
Note: If you scroll a selected event out of view in the Event List, the event becomes
deselected.
If a Stage is not available in this list, use the ArcSight Console to move the case to that
stage.
Tip: When viewing event information, click the pushpin icon to dock the Event Details dialog in
the channel viewer grid.
Note: If you scroll a selected event out of view in the event list, the event is deselected.
3. If you selected multiple events, select the desired event from the event tree.
4. When viewing event details:
l To filter event information based on fields, use the Show Fields Containing field.
l To filter event information by field set, select the desired field-set from the Field Set
drop-down list.
To clear the field set filter, open the field set selector and click the left arrow button.
l To access Recon, click a field name and select Recon or Recon (Multiple Fields).
Recon must support the fields that you select.
5. When viewing event annotation history:
l The “Hidden” flag indicates that you specified "Flagged as Similar” for the event stage
name. This event is hidden from all but the assigned users.
l The “Is Reviewed” flag indicates that you marked an event as reviewed.
6. When viewing payload information:
l A preserved payload remains attached to the event.
l When you download a preserved payload, the payload still remains attached to the
event.
Command Center might not display non-ASCII payload data. If the Download Payload
button is enabled but no data appears, click Download Payload to download the data
to a text editor.
an active channel.
Note: There are two types of knowledge base articles: Import and Reference. The ArcSight
Command Center currently supports only Reference-type articles associated as Rows.
For more information about associating knowledge base articles with an event, see the
"Knowledge Base Authoring" section in the ArcSight Console User's Guide.
Managing Channels
You can create two types of event channels: one based on the attributes of an existing channel
and one created new.
NOTE: If a channel has not been locked, it is possible for multiple users to edit a Channel's
attributes in both at the same time. If another user saves changes to a channel while you are
editing it, you will be prompted that the channel has changed. If you are actively editing the
channel, the page may return to the Channel resource list (for example, if the user changed the
Channel name).
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
1. Select the desired active channel folder.
2. Click New.
Start Time The relative or absolute time reference that begins the period to track events in the channel.
To specify the time expression, make a selection from the Start Time drop-down menu.
Note: If a channel is open when Daylight Savings Time starts or ends, it does not show the
correct start time until you restart it.
For a list of possible time values see the Start Time: field pull-down menu.
End Time The relative or absolute time that ends the period to actively track the events in the channel.
To specify the time expression, make a selection from the End Time drop-down menu.
Note:
If a channel is open when Daylight Savings Time starts or ends, the live channel does not show
the correct start time until you restart it.
Use as Choose the event-timing phase that best supports your analysis. End Time represents the time
Timestamp the event ended, as reported by the device. Manager Receipt Time is the recorded arrival time
of an event at the ArcSight Manager.
Time Choose whether the channel will Continuously Evaluate (like $Now) to show events that are
Evaluation qualified by Start and End times which are re-evaluated constantly while the channel is
running, or Snapshot to show only the events that qualify when the channel is first run.
A channel set to Continuously evaluate is also known as a sliding channel, and typically has
its End Time option set to $Now.
$Today Midnight (the beginning of the first minute) of the current day
$Today - 1d Midnight (the beginning of the first minute) of the current day minus one day
$Today - 1w Midnight (the beginning of the first minute) of the current day minus one week
h Hours
d Days
w Weeks
5. To specify columns for the active channel grid view, click Configure Field Set.
See "Specifying Columns For the Active Channel Event List" below.
6. To add a filter to the channel, click Configure Filter to add filter conditions in the Common
Conditions Editor (CCE).
See " Specifying Filter Conditions for an Active Channel" on the next page.
7. To validate the filter, choose Operations > Validate.
Command Center interactively checks condition statements as you add them. The validate
option checks the condition statements collectively to ensure operators are used correctly.
The Validate Filter popup appears with the status of the filter. If there is a violation, edit
the filter conditions.
8. To edit filter conditions, choose either Operations > Summary and make changes directly
in the SQL code, or right click the desired condition statement and make a selection form
the extended menu.
Specifying New Condition from the extension menu creates a condition, at the specified
location, that is in agreement with the selected condition.
9. Click Update Filter Configuration and then Save in the top half of the dialog box.
See Also:
"Creating a Channel Based on an Event Attribute" on page 62
About:
The columns in the active channel Event List are based on the fields in a configured field set.
Prerequisite:
Create an event channel.
Specifying Columns For the Active Channel Event List Page 55 of 231
User's Guide
Chapter 3: Monitoring Events Through Active Channels
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
1. Select the desired active channel folder.
Note: By default, Command Center stores active channels in the folder of the user who
created the channels.
About:
You can specify filter conditions at channel creation or during a channel edit.
Prerequisite:
Create an event channel in order to edit filter conditions.
See "Creating an Event Channel" on page 53 or "Creating a Channel Based on an Event
Attribute" on page 62.
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
Note: For a channel based on the attribute of an existing channel, Command Center stores
the channel in the [user]'s Active Channel folder, by default, where [user] is the currently
logged in username.
Note: Since the filter is created within the channel, the filter works only for the channel.
To edit a condition in the filter, double-click on the condition and use the statement editor
on the right side of the window.
5. (Conditional) If you want to configure the filter using on-screen elements, complete the
following:
a. (Conditional) If your filter requires two or more condition statements, add a logical
operator from the Operators area.
Logical
Operator Name Use
& AND The new condition has to match in addition to existing conditions.
Fields You can specify fields with particular values as part of condition statements.
Filters A filter limits what events a channel displays. If the criteria of the condition are met,
the evaluation returns true or false. Events that do not meet the condition or
conditions are not evaluated further, but they are preserved in the data store.
If there are existing filter conditions, you can tie them to the added filter condition
with a logical operator.
Assets After assets are added to your network model, you can select them in order to write
conditions that help you analyze their role in the event traffic they process. You can
select an asset to add to filters as a new condition.
Asset conditions state whether your enterprise assets are targets or sources of events.
An asset condition states “if an event occurs and the selected asset is the source or
target, generate a correlation event.”
If there are existing filter conditions, you can tie them to the asset condition with a
logical operator. If AND is used, all the existing conditions and the asset condition must
occur in the event. If OR is used, either the existing conditions or the asset condition
must occur. If NOT is used, all but the asset condition must occur.
Vulnerabilities Specify the conditions of any hardware, firmware, or software state that leaves an
asset open for potential exploitation.
If there are existing filter conditions, you can tie them to the vulnerability condition
with a logical operator. If AND is used, all the existing conditions and the vulnerability
condition must occur in the event. If OR is used, either the existing conditions or the
vulnerability condition must occur. If NOT is used, all but the vulnerability condition
must occur.
To change the field or operator, use the Field and Operator fields,
respectively.
C. Click Apply Condition.
Starting with the addition of a logical operator, use the above steps to add
any other field conditions.
D. Click Update Filter Configuration.
ii. To specify a Filter Condition, complete the following steps:
A. Select a location in the condition statements list, and then click the Filters
condition button . Select the desired filter from the area at the bottom
right.
B. Click Apply Condition to add the condition to the filter.
C. Click Update Filter Configuration.
iii. To specify an Asset Condition, complete the following steps:
A. Select a location in the condition statements list, and then click the Asset
condition button . Select the desired asset from the area at the bottom
right. This list of Assets is larger than in the ArcSight Console.
The value selected from the <xxx> Asset ID drop-down menu, the checkbox,
the value selected in the NULL/NOT NULL drop-down menu, and the
Selected Resource group (under the Asset Category, Asset, or Zones tab)
work together to define the Asset Condition statement. Selecting the
checkbox enables the is NULL qualifier of the statement. When enabled, the
statement evaluates whether the attribute does not exist in the Selected
Resource group. When the checkbox is not selected, the statement
evaluates whether the attribute value does exist.
Asset Condition filters select Events where the attribute you specified
contains a value that is also found in the:
- Asset Category (if you selected an item under the Asset Categories tab)
- Asset Group (if you selected an item under the Assets tab)
- Zone Group (if you selected an item under the Zones tab)
To create a condition that selects an individual Asset by its unique ID or
name, use the Field Condition and then specify the value directly.
B. Select an asset or group and then click Apply Condition.
C. Click Update Filter Configuration.
iv. To specify a Vulnerability Condition, complete the following steps:
A. Select a location in the condition statements list, and then click the
Vulnerability condition button .
B. Select the desired vulnerability from the area at the bottom right.
C. To include any assets in the filter that could be impacted by the selected
vulnerability, select the a value from the <xxx> Asset ID drop-down list (for
example, Agent Asset ID).
D. Click Apply Condition.
E. Click Update Filter Configuration.
Repeat this step for each condition statement you want to include in the channel filter.
6. (Conditional) If you want to configure the filter using plain text, complete the following:
a. Choose More Operations > Plain Text.
Note: Using plain text overwrites any existing filter conditions. The Plain Text window
also allows you to launch a third-party website that can convert SIGMA format to plain
text, which you can then copy into the filter. Click SIGMA Converter and follow the
instructions on the website.
Note: The plain text filter does not support matchesfilter, Assets, hasvulnerability,
or inActivelist field types.
l Joins:
l AND
l OR
l NOT
Formatting considerations:
l For field names, use the database name in camel case, such as targetAddress or
bytesIn.
l The String, Int, Date Time, and Resource Ref field values must be in double quotes,
such as "abc".
l All fields support the standard operators, except String fields, which do not
support < or >.
Some examples:
((name Contains "abc" And targetAddress EQ "2.2.2.2") Or (bytesIn EQ 34
And bytesOut EQ 45))
vulnerability = "JliIuzwQBABCD+OSTHY1U5Q==:/All Vulnerabilities/CVE/CVE
- CAN-2003-0605:CVE|CAN-2003-0605::"
endTime Between ("01/28/2020 16:21:51.000 -0600", "01/29/2020
16:21:51.000 -0600")
7. To validate the filter, choose More Options: Operations > Validate.
Command Center interactively checks condition statements as you add them. The validate
option checks the condition statements collectively to ensure operators are used correctly.
The Validate Filter popup appears with the status of the filter. If there is a violation, edit
the filter conditions.
8. To edit filter conditions, right click the desired condition statement and then choose either
Edit or Remove.
This choice displays the appropriate work area at the bottom right.
9. To view the logic of the filter conditions, choose More Options: Operations > Summary.
10. Click Update Filter Configuration and then Save Channel in the top portion of the dialog
box.
Note: When creating an Asset Filter, Command Center will not display Assets (under the Assets
tab) that have the Asset Disabled flag set. You access this list in the New (or Edit) Channel pop up
> Configure Filter > Asset Filter Condition statement options.
You can create a Field condition statement for any field that stores an IP Address and then use
the InSubnet operator to match IP addresses in an address range. See the following topic for
valid IP address ranges.
IP Address Ranges
The insubnet operator uses a range of IP addresses. Use the following guidelines to input IP
address ranges in a single string.
Caution: The IP address range must be in the same family, for example, a range of IPv4
addresses or a range of IPv6 addresses.
Two-address A two-address range is in the format firstAddress - lastAddress, meaning any address
range between an arbitrary range of any two addresses, inclusive.
IPv4 range: 192.168.0.0 - 192.168.255.255
IPv6 range: 2001:db8:fd0c:: - 2001:db8:fd0c:ffff:ffff:ffff:ffff:ffff
CIDR The CIDR notation is in the format address/prefix-length. This format is more restrictive than
notation the two-address range format where the range starts and ends.
IPv4 range: 192.168.0.0/24
IPv6 range: 2001:db8:fd0c::/64
Wildcard Fields on the right end of an address may be replaced with an asterisk, with no numeric data to the
expressions right of the first asterisk. The wildcard represents the range of all values for the field, from all-zero
bits to all-one bits. This format is more restrictive than the two-address range format in where the
range starts and ends.
IPv4 range: 192.168.*.*
IPv6 range: 2001:db8:fd0c:*:*:*:*:*
See Also:
"Editing an Event Channel" on page 64
Note: If the channel that you are investigating originated in the ArcSight Console and contains
event fields not supported in Command Center, these unsupported event fields will not be lost
and can be viewed in the ArcSight Console.
Procedure:
1. Open the desired channel.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen > Event List tab, click the desired event link.
For easier selection, click the pause button to freeze the Event List.
A new view that is a subset of the main active channel is created. Note that the total
events count is less than the parent channel’s total.
Option Use
Create Channel Show only those events in which the selected attribute matches the value in the
[attribute=value] selected event.
Create Channel Show only those events in which the selected attribute does not match the value
[attribute!=value] in the selected event.
Add [attribute=value] to Show only those events that match both the prior and new filter elements.
Channel
Add [attribute!=value] to Show only those events that do not match both the prior and new filter
Channel elements.
4. To save the new channel, click Save As and do one the following in the Save Channel As
dialog:
l Accept the default channel location - Specify the channel name and accept “[user’s]
Active Channels” in the Location drop-down.
l Specify an alternate channel location - Specify the channel name, click the Location
drop-down and then make the appropriate selection from the Select popup.
Note: If you choose a folder that has a parent, you must first select the parent folder
from the left folder navigation and then select the child folder from the "Display
Name" column. Direct selection of a child folder is not supported. This design helps to
simplify the selection of a child folder that is multiple levels deep in a folder structure.
5. Click OK.
6. To view the new channel in the default folder, or alternative folder that you may have
specified, click the resource tree tab.
See Also:
"Editing an Event Channel" below
"Creating an Event Channel" on page 53
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
Note: For a channel based on the attribute of an existing channel, Command Center stores the
channel in the "[user's] Active Channel" folder, by default.
Start Time The relative or absolute time reference that begins the period to track events in the channel.
To specify the time expression, make a selection from the Start Time drop-down menu.
Note: If a channel is open when Daylight Savings Time starts or ends, it does not show the
correct start time until you restart it.
For a list of possible time values see the Start Time: field pull-down menu.
End Time The relative or absolute time that ends the period to actively track the events in the channel.
To specify the time expression, make a selection from the End Time drop-down menu.
Notes:
l If a channel is open when Daylight Savings Time starts or ends, the live channel does not
show the correct start time until you restart it.
l If setting the End Time results in the message “Invalid end date for sliding channel,” the
channel is set to Continuous evaluation instead of Evaluate once. Either re-set the
End Time or change the Time Parameters option for the channel to Continuous
evaluation.
l Avoid creating an active channel that queries more than once per day.
Use as Choose the event-timing phase that best supports your analysis. End Time represents the time
Timestamp the event ended, as reported by the device. Manager Receipt Time is the recorded arrival time
of an event at the ArcSight Manager.
Time Choose whether the channel will be Continuously Evaluate (like $Now) to show events that
Evaluation are qualified by Start and End times which are re-evaluated constantly while the channel is
running, or Snapshot to show only the events that qualify when the channel is first run.
A channel set to Continuously evaluate is also known as a sliding channel, and typically has
its End Time option set to $Now.
Current Period
Period Description
$Today Midnight (the beginning of the first minute) of the current day
$CurrentWeek Midnight of the previous Monday (or same as $Today if today is Monday)
Units
Unit Description
h Hours
d Days
w Weeks
4. To specify columns for the active channel grid view, click Configure Field Set.
See "Specifying Columns For the Active Channel Event List" on page 55.
5. To add a filter to the channel, click Configure Filter to add filter conditions in the Common
Conditions Editor (CCE).
See " Specifying Filter Conditions for an Active Channel" on page 56.
6. To validate the filter, choose Operations > Validate.
Command Center interactively checks condition statements as you add them. The validate
option checks the condition statements collectively to ensure operators are used correctly.
The Validate Filter popup appears with the status of the filter. If there is a violation, edit
the filter conditions.
7. To edit filter conditions, right click the desired condition statement and make a selection
from the extended menu.
Selecting a New Condition button creates a condition, at the specified location, that is in
agreement with the selected condition.
8. Click Update Filter Configuration and then Save Channel in the top half of the dialog box.
See Also:
l "Creating an Event Channel" on page 53
l "Creating a Channel Based on an Event Attribute" on page 62
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
1. Click Channels > Active Channels.
2. Expand the appropriate active channel folder in the resource tree and then click the
desired folder.
Channels associated with the folder appear in a table in the center of the screen, as seen in
the following typical view of active channels.
3. Click in the row of the desired channel, without clicking on the Display Name link.
4. With the channel row highlighted, click Delete.
Procedure:
Location: Channels > Active Channels > Active Channel - list screen > resource tree
1. Click Channels > Active Channels.
2. Expand the appropriate active channel folder in the resource tree and then click the
desired folder.
Channels associated with the selected folder appear in a table in the center of the scree.
3. Select the row of the desired channel, without clicking on the Display Name link.
4. With the channel row highlighted, click Copy. A new channel will be created in that folder
with the same specifications as the original channel.
Note: A case must be locked in order to edit it. This prevents other users from modifying the
case while you are adding an event.
On the channel, the events are available based on the retention period of the Default Storage
Group (see "Storage" on page 156).
Caution: Events added to a case are accessible in the context of that case to any user who has
permissions to view or edit the case. Even users who do not have permissions on the events
themselves have permissions to view full events in the context of a case to which they have
permissions.
Consider this when adding events to a case and setting access control lists (ACLs) on cases.
Procedure:
1. Open the desired channel.
See "Viewing Events On an Active Channel" on page 38.
2. From the Active Channel screen > Event List tab, select the desired event and then click
Add to Case.
When adding base events of the correlation events, a pop-up appears.
3. Click OK to add the base events of the correlation events to the case.
4. From the popup, select the desired case from the appropriate case folder and then click
OK.
5. To verify the events in the case, open the case in the Cases tab.
Note: If you scroll a selected event out of view in the Event List, the event becomes
deselected.
The Is Reviewed flag appears in the Annotation History tab of the Events Details popup.
Note: Command Center can support only one visualization view per browser window session.
3. To select events over a specific period of time, make a selection from the Active Channel
Radar.
See "Using the Active Channel Radar" on page 49.
Note: Command Center can accept a maximum of 100,000 events for visualization. Any
events in excess of this limit will cause event visualization to be disabled. In this case,
reduce the range of events on the Active Channel Radar. If a channel has too many events,
using the correct filter can reduce the amount of events and make visualization possible.
Note: If the specified time range is very narrow and the number of events in this range is
low, the Event Count widget will be empty.
Click Reset All Filters to restore all open widgets to reflect the full range of events.
You can create an Active Channel using the chart data in the Visualize Events tab.
1. Under the Visualize Events tab, right-click on a histogram bar in any chart.
2. In the context menu that appears, select one of the options to add filtering to the existing
channel filter.
NOTE: When accessing Command Center using Firefox 38 from a Linux client, this context
menu does not persist sufficiently to enable a selection. The work around is to access this
capability using a browser on a non-Linux platform.
Chapter 4: Searching for Events in the ArcSight Command Center Page 71 of 231
User's Guide
Chapter 4: Searching for Events in the ArcSight Command Center
There are several convenient ways to enter a search query: typing the query in the Search text
box, using the Search Builder tool to create a query, or using a previously saved query (referred
to as a filter or saved search).
When you type a query, the Search Helper provides suggestions and possible matches to help
you build the query expression. (See "Search Helper" on page 99 for more information.)
In addition to typing the query in the Search text box, you can do the following:
l Create queries by using the Advanced Search tool. For more information, see "Using the
Advanced Search Tool" on page 95.
l Save queries and use them later. For more information, see "Saved Queries (Search Filters
and Saved Searches)" on page 120.
l Create new queries from the predefined queries that come with your system. For more
information, see "Predefined Search Filters" on page 122
Although a search query can be as simple as a keyword, you will be better able to utilize the full
potential of the search operation if you are familiar with all the elements of a query, as
described in the next section, "Elements of a Search Query" on the next page.
For more information on the search operators, see "Search Operators" on page 196. For more
information on creating and using charts, see "Chart Drill Down" on page 111 and "Refining and
Charting a Search from Field Summary" on page 114.
Query Expressions
A query expression is a set of conditions that are used to select events when a search is
performed. An expression can specify a very simple term to match such as “login” or an IP
address; or it can be more complex enough to match events that include multiple IP addresses
or ports, and that occurred between specific time ranges from a specific storage group.
Specify the query in the Search text box by using the following syntax:
<Search Expression> | <Search Operators>
The query expression is evaluated from left to right in a pipeline fashion. First, events matching
the specified search expression are found. The search operator after the first pipe (“|”)
character is then applied to the matched events followed by the next search operator, and so
on to further refine the search results.
The search results table and the histogram display the events that match the query as they are
found. As additional events are matched, the search results table and the histogram are
refreshed. Certain search operators such as head and tail, require a query to finish running
before search results can be displayed.
l Search Expressions are described in "Search Expressions" below.
l Search Operators are described in "Search Operators" on page 82.
Search Expressions
The Search Expression section of the query uses fields to search for relevant data quickly and
efficiently. You can use a search expression to specify keywords to search for in the event text
or to search using field-based expressions in a Boolean format.
l "Keyword Search (Full-Text Search)" below
l "Field-Based Search" on page 77
Note: Although the Boolean operators AND, OR, and NOT can be specified in upper-, lower-, or
mixed case when used as an operator, it is recommended that you use uppercase for ease of
reading the query.
Space You cannot specify keywords that contain the characters in the left column. Therefore, to search
Tab for a phrase such as failed login, enter “failed” AND “login”.
,
;
(
)
[
]
{
}
“
|
*
= To specify a keyword that contains any of the characters in the left column, enclose the
: keyword in double quotes (“ ”). You can also specify an asterisk (*) at the end of the keyword
for an exact match.
/
Examples:
\
o “C:\directory”
@
o “result=failed”
-
?
#
$
&
_
%
>
<
!
* You can use the wildcard character asterisk (*) to search for keywords, however, the wildcard
cannot be the leading character in the keyword. Therefore, the following usage is valid:
o log*
o "log*"
o log\*
o log\\*
o log*app
o log*app*app
However, the following usage is not valid:
o *log
o *log*app*
Field-Based Search
You can search any field defined in the schema. A list of the schema fields, along with their
field descriptions is available from the Administration > Search > Default Fields tab.
For instructions on how to view the fields, see "Viewing the Default Fields " on page 186.
Note: Not all ESM event information is available for searching. To search for fields not included
in the Default Fields list, use the ArcSight Console through a query viewer. Refer to the Query
Viewers topic in the ArcSight Console User's Guide.
You can specify multiple field conditions and also connect keywords to field conditions in a
query expression; when doing so, connect them with Boolean operators. For example, the
following query searches for events with keyword “failed” (without double quotes) or events
with “name” fieldset to “failed login” (lowercase only; without double quotes) and the message
field not set to “success” (lowercase only; without double quotes):
failed OR (name=“failed login” AND message!=“success”)
Note: If a query includes the Boolean operator OR and the metadata identifiers (discussed in
"Constraints" on page 86 ), the expression to be evaluated with OR must be enclosed in
parentheses, as shown in this example:
(success OR fail) _storageGroup IN [“Default Storage Group”]
The field operators you can use in a query expression are listed in the following table.
Note: In addition to these operators, you can use search operators, as discussed in "Search
Operators" on page 82.
Multiple field conditions can be specified in one query expression by using the listed operators
between them. The conditions can be nested; for example, (name=“John Doe” OR
name=“Jane Doe”) AND message!=“success”.
Any literal operator in the following list can be specified in upper-, lower-, or mixed case. To
search for these words as literals in events, enclose them in double quotes (“”). For example,
message CONTAINS “Between”.
< startTime <“$Now - 1d” The operators >, <, >=, <=, IN, and BETWEEN evaluate the condition
lexicographically. For example, deviceHostName BETWEEN AM AND
>= endTime >=“01/13/2009 EU searches for all devices whose names start with AM, AMA, AMB,
07:07:21” AN, AO, AP and so on, up to EU. Therefore, any device whose name
endTime >=“2009/13/01 starts with AK, AL, and so on is ignored. Similarly, devices with names
00:00:00 PDT” EUA, EUB, FA, GB, and so on will be ignored.
IN priority IN [2,5,4,3]
destinationAddress IN
[“10.0.20.40”,
“209.128.98.147”]
_deviceGroup IN
[“DM1”]
_storageGroup NOT IN
[“Internal Event Storage
Group”, “SG1”]
_peerLogger IN
[“192.0.2.10”,
“192.0.2.11”]
BETWEEN priority BETWEEN 1 AND For BETWEEN, the minimum value for the range must appear first in
5 the expression before the maximum. For example, 20 BETWEEN -100
AND 100.
STARTSWITH message STARTSWITH Valid for all String data types only.
“failed”
To determine the data type of a field, see "Viewing the Default Fields "
on page 186.
ENDSWITH message ENDSWITH Valid for all String data types only.
“login”
CONTAINS message CONTAINS Valid for all String data types only.
“foobar”
INSUBNET agentAddress INSUBNET IPv4 and IPv6 address ranges only. For best results, the IP address
“127.0.0.1- range must be in the same family, for example, a range of IPv4
127.0.0.100” addresses or a range of IPv6 addresses. See IP Address Ranges, below.
agentAddress INSUBNET
Note: Do not use INSUBNET to look for NULL addresses.
“127.0.0.*”
agentAddress INSUBNET
“127.*.*.*”
agentAddress INSUBNET
“127.0.0.0/24”
IP Address Ranges
The insubnet operator uses a range of IP addresses. Use the following guidelines to input IP
address ranges in a single string.
Caution: The IP address range must be in the same family, for example, a range of IPv4
addresses or a range of IPv6 addresses.
Two-address A two-address range is in the format firstAddress - lastAddress, meaning any address
range between an arbitrary range of any two addresses, inclusive.
IPv4 range: 192.168.0.0 - 192.168.255.255
IPv6 range: 2001:db8:fd0c:: - 2001:db8:fd0c:ffff:ffff:ffff:ffff:ffff
CIDR The CIDR notation is in the format address/prefix-length. This format is more restrictive than
notation the two-address range format where the range starts and ends.
IPv4 range: 192.168.0.0/24
IPv6 range: 2001:db8:fd0c::/64
Wildcard Fields on the right end of an address may be replaced with an asterisk, with no numeric data to the
expressions right of the first asterisk. The wildcard represents the range of all values for the field, from all-zero
bits to all-one bits. This format is more restrictive than the two-address range format in where the
range starts and ends.
IPv4 range: 192.168.*.*
IPv6 range: 2001:db8:fd0c:*:*:*:*:*
Note: If you are using connectors that support IPv4 only, it is recommended that you do not send
IPv4 addresses using the Device Custom IPv6 addresses 1 through 4 (dvc_ custom_ ipv6_
address1,dvc_custom_ipv6_address2,dvc_custom_ipv6_address3,dvc_custom_ipv6_address4).
Caution: For the INSUBNET operator, the IP address range must be in the same family, for
example, a range of IPv4 addresses or a range of IPv6 addresses.
Address Fields
agentAddress agt_trans_address
destinationAddress destinationTranslatedAddress
dvc_custom_ipv6_address1 dvc_custom_ipv6_address2
dvc_custom_ipv6_address3 dvc_custom_ipv6_address4
dvc_trans_address f_dvc_address
f_dvc_trans_address o_agt_address
o_agt_trans_address sourceAddress
sourceTranslatedAddress
Examples:
deviceAddress = 192.0.2.1
destination_Address = 2001:0DB8:85A3:0042:1000:8A2E:0370:7334
Note: IPv6 addresses stored in fields dvc_custom_ipv61-4 in previous versions of ESM are still
searchable, but IPv4 addresses are not.
dvc_mac_address o_agt_mac_address
Examples:
agt_mac_address = 00-00-5E-00-53-00
dvc_mac_address = 00-00-5E-00-53-FF
Search Operators
Search Operators enable you to refine the data that matched the Field Search search filter. The
rex search operator is useful for syslog events (raw or unstructured data) or if you want to
extract information from a specific point in an event, such as the 15th character in an event.
The other operators, such as head, tail, top, rare, chart, sort, fields, and eval are applied
to the fields you specify or the information you extract using the rex operator. See "Search
Operators" on page 196 for a list of search operators and examples of how to use them.
Time Range
The endTime timestamp indicates when the event occurred. A search query uses this time to
search for matching events.
A search operation requires you to specify the time range within which events would be
searched. You can select from many predefined time ranges or define a custom time range to
suit your needs.
Predefined time range: When you select a predefined time range such as “Last 2 Hours” or
“Today”, the time range is relative to the current time. For example, if you select “Last 2
Hours” at 2:00:00 p.m. on July 13th, events from 12:00:00 to 2:00:00 p.m. on July 13th will be
searched. If you refresh your search results at 5:00:00 p.m. on the same day, the time window
is recalculated. Therefore, events that match the specified criteria and occurred between
3:00:00 and 5:00:00 p.m. on July 13th are displayed.
Custom time range: You can specify a time range in a 24-hour format to suit your needs. For
example, a custom time range is:
Start: 8/13/2016 13:36:30
End: 8/13/2016 22:36:30
By default, the end time for a custom time range is the current time on your system and the
start time is two hours before the current time.
You can also use variables to specify custom time ranges. For example, a dynamic date range
might start at $Now - 2h (two hours ago) and end at $Now (the current time). The dynamic
search is relative to when the query is run. Scheduled search operations use this mechanism to
search through newer event data each time they are run.
The “Dynamic” field in the user interface enables you to specify the dynamic time, as shown in
the following figure:
Following is a typical example of a dynamic search that limits results to the last two hours of
activity:
Start: $Now - 2h
End: $Now
Where <current_period>, such as $Now, either stands alone or is followed by either a plus (‘+’)
or minus (‘-’) and a number of units, such as 2h for two hours. The <current_period> always
starts with a ‘$’ and consists of a word, case-sensitive, with no spaces, as shown in the
following table. The <units> portion, if given, consists of an integer and a single, case-sensitive
letter, as shown in Units table.
Note: Use the <= and >= operators to narrow down the time range. Do not use = or !=.
Current Period
Period Description
$Today Midnight (the beginning of the first minute) of the current day
$CurrentWeek Midnight of the previous Monday (or same as $Today if today is Monday)
Units
Unit Description
h Hours
d Days
w Weeks
Fieldsets
A fieldset determines the fields that are displayed in the search results for each event that
matched a search query. The system provides a number of predefined fieldsets. These fieldsets
are for use when searching from ArcSight Command Center. For information about field sets
for ArcSight Console, see the ArcSight Console User's Guide.
Note: The first time you open the search page in a new browser window the fieldsets lists are
hidden and you cannot select them. Run a short search to display the hidden options.
l To view the current list of available fieldsets, click the down arrow in the Fields dialog box.
The current System Fieldsets list is displayed.
l To see the fields included in each of the predefined fieldsets, click the (Customize
Fields) icon.
l To view a list of fields that are included for each fieldset type, select the fieldset from the
drop-down list and mouse over the Field’s label.
Note: Only fields available for matched events are displayed in a Search Results display (or
the exported file). Therefore, even if you select the All Fields fieldset, you might not see all
fields displayed in the search results.
l When you use a search operator that defines a new field, such as rex, rename, or eval, a
new column for each field is added to the currently selected display. These newly defined
fields are displayed by default. The User Defined Fields fieldset enables you to view only
the newly defined fields.
l The Raw Event fieldset displays the complete raw syslog event in a column called
rawEvent. The event is formatted to fit in the column.
Note: To see the raw events in the rawEvent column, enable the Search Option, “Populate
rawEvent field for syslog events”. See "Tuning Search Options" on page 182 for more
information.
Although the Raw Event field is most applicable for syslog events, you can also display the raw
event associated with CEF events in the rawEvent column. To do so, make sure the connector
that is sending events to the system populates the rawEvent field with the raw event.
deviceCustomDate1label lbl_date1_label
deviceCustomDate2label lbl_date2_label
deviceCustomNumber1label lbl_number1_label
deviceCustomNumber2label lbl_number2_label
deviceCustomNumber3label lbl_number3_label
deviceCustomString1label lbl_string1_label
deviceCustomString2label lbl_string2_label
deviceCustomString3label lbl_string3_label
deviceCustomString4label lbl_string4_label
deviceCustomString5label lbl_string5_label
deviceCustomString6label lbl_string6_label
You can save the custom field set for permanent use, or use it only for the current session.
If you click OK, the field set is available for use in the current session and is labeled “Custom
(not saved)." It is not visible to other users. After you log out of the current session, Command
Center deletes the temporary field set. You can only have one temporary custom field set at a
time.
If you click Save, the field set appears under the Shared Fieldsets category and is available to
other users. You can edit and delete saved field sets.
Field set selection is specific to a user’s interface. For example, UserA and UserB are connected
to the same Manager and are using the default field set for search results. User A changes the
selection to a custom field set. The change only affects the display for User A.
Constraints
Using constraints in a query can speed up a search operation as they limit the scope of data
that needs to be searched. Constraints enable you to limit a query to events from one or more
of the following:
l Stored in particular storage groups
l Stored on specific peers
For example, you might want to search for events in the SG1 and SG2 storage groups on the
local system only.
For information about storage groups and peers, see "Storage" on page 156 and "Peers" on
page 187.
l If a query includes the Boolean operator OR and metadata identifiers, the expression to be
evaluated with OR must be enclosed in parentheses, as shown in this example:
(success OR fail) _storageGroup IN [“Default Storage Group”]
Caution: If a search query contains constraints and a regular expression, make sure
that the constraints are specified before the regular expression. For example, _
peerLogger IN [“192.0.2.10”] name contains abc | REGEX=“:\d31”
o Selecting Storage Groups or peers from the Advanced Search tool. (To access the
Advanced Search tool, click Advanced Search beneath the text box where you type the
query.) For more information about the Advanced Search, see "Using the Advanced
Search Tool" on page 95.
o Syntax reference for query expressions
To create valid and accurate query expressions, follow these requirements.
Escape \ \ \
charact
Use to escape \. You cannot escape any Use to escape \, “, and *. Use to escape
er
other character. any special
Examples:
character.
l name=log\\ger (matches log\ger)
Example:
l name=logger\* (matches logger*)
To search for
a term with
the character
“[” :
|REGEX=
“logger\[”
Escapin Cannot search for * Can search for * by escaping the character Can search
g for * by
Example: name=log\* is valid
wildcar escaping the
d log\* is invalid character
charact
er
Exact Enclose keyword in double quotes; Enclose value in double quotes No special
Match/ Otherwise, keyword treated as keyword*. requirement.
Example:
Search
Example:
string message=“failed login”
includes log (matches log, logging, logger, and so
an on)
operato
“log” (matches only log)
r or a
special Note: See the list of special characters
charact that cannot be searched even when
er enclosed in double quotes, later in this
table.
Operat Upper-, lower-, or mixed case Boolean Use any operator listed in the "Field-Based | and the
ors operators—AND, OR, NOT. If an operator Search" on page 77 section. operators
is not specified, AND is used. described in
l Unless a value is enclosed between
"Search
To search for literal operator AND, OR, double quotes, a space between values
Operators" on
NOT, in an event, enclose them in double is interpreted as an AND. For example,
page 196.
quotes. name=John Doe is interpreted as John
AND Doe. Use this
Example: “AND”, “or”, “Not”
l If an operator is not specified between operator to
Note: If a query includes the Boolean multiple field expressions, AND is used. AND multiple
operator OR and the metadata identifiers regular
(_storageGroup and _peerLogger), the l To search for literal operator, enclose
expressions in
expression to be evaluated with OR must the operator in double quotes.
one query
be enclosed in parentheses, as shown in Examples:
expression.
this example: message STARTSWITH=“NOT”
(success OR fail) _storageGroup IN message=“LOGIN DID NOT SUCCEED”
[“Default Storage Group”]
l If a query includes the Boolean
operator OR and the metadata
identifiers (_storageGroup and _
peerLogger), the expression to be
evaluated with OR must be enclosed in
parentheses, as shown in this example:
(success OR fail) _storageGroup
IN [“Default Storage Group”]
Primary You can search for keywords containing You can search for these characters. Enclose l Cannot
Delimit primary delimiters by enclosing the value in double quotes if value contains any contain ^
ers: keywords in double quotes. of these characters. in the
beginnin
Space Example: Example: name=“John*”
g and $
, “John Doe” at the
end as a
; “Name=John Doe”
matching
( “www.microfocus.com” character
) unless
the
[ regular
] expressi
on you
} specify
“ must
look for
| an event
* that
contains
> only the
< pattern
you are
!
specifyin
g; for
example,
|REGEX=
“^test
$” will
search
for
events
containi
ng the
word
“test”
(without
quotes)
only.
l Special
regular
expressi
on
characte
rs such
as \ and
? need to
be
escaped.
Second You can also search for keywords You can search for these characters. Enclose l Cannot
ary containing secondary delimiters once you value in double quotes if value contains any contain ^
Delimit have configured the full-text search of these characters. in the
ers: options as described in "Tuning Search beginnin
Example: name=“John.”
Options" on page 182. g and $
=
at the
Example: You can search for
. end as a
microfocus.com in a URL
matching
: http://www.microfocus.com/apps by
character
specifying microfocus.com as the search
/ unless
string.
\ the
regular
@ expressi
- on you
specify
? must
# look for
an event
$ that
& contains
only the
_ pattern
% you are
specifyin
g; for
example,
|REGEX=
“^test
$” will
search
for
events
containi
ng the
word
“test”
(without
quotes)
only.
l Special
regular
expressi
on
characte
rs such
as \ and
? need to
be
escaped.
Time No specific format. The query needs to Use this format to specify a timestamp in a No
format, contain the exact timestamp string. For query (including double quotes): restrictions.
when example, “10:34:35”. “mm/dd/yyyy hh:mm:ss”
searchi
Note: The string cannot contain spaces. OR
ng for
For example, “Oct 19” is invalid.
events “yyyy/mm/dd hh:mm:ss timezone”
that
occurre OR
d at a “MMM dd yyyy hh:mm:ss timezone”
particul
where mm=month
ar time
dd=day
yyyy=year
hh=hour
mm=minutes
ss=seconds
timezone=EDT, CDT, MDT, PDT.
MMM=First three letters of a month’s
name; for example, Jan, Feb, Mar, Sep, Oct,
and so on.
Use the <= and >= operators to narrow
down the time range. Do not use = or !=.
Wildcar * Cannot be the leading character; only a * Can appear anywhere in the value. * Can appear
d suffix or in between a keyword. anywhere.
Examples:
Examples:
name=*log (searches for ablog, blog, and so
l *log is invalid on.)
l log* is valid name=“\*log”
l lo*g* is valid name=\*log
(both search for *log)
AND
OR
NOT
3. If you want to load a search filter or a saved search, click the icon. Select the search
filter or the saved search from the displayed list and click Load+Close.
4. For more information, see "Saved Queries (Search Filters and Saved Searches)" on
page 120 and "Predefined Search Filters" on page 122.
5. To add a keyword (full-text search) or field condition:
a. Locate the field you want to add under the Name column.
To specify a keyword (full-text search), use the fullText field under the Name column, as
shown in the following figure.
b. Click the Operator column associated with the field, select the operator from the
displayed list, and press Enter.
c. Only operators applicable to a field are displayed in the list.
d. In the Condition column associated with the field, enter a value and press Enter.
Note: To edit a condition, right- click on the condition for a drop- down menu that
enables you to edit, cut, copy, or delete the condition.
6. Repeat step 1 through step 5 until you have added all the conditions.
7. If your search query will also include a regular expression, type it in the Regex field.
8. If you want to constrain your search query to specific storage groups or peers, click the
icon next to the constraint category. Select the relevant groups and peers. (To select
multiple groups, hold the Ctrl-key down.)
The Peer constraint category is displayed only if peers are configured on your system.
If multiple values are selected for a constraint, those values are linked together with OR.
For example, if you specify peers A, B, C, the query will find events in peers A, B, or C.
For information about storage groups and peers, see "Storage" on page 156and "Peers" on
page 187.
9. Click Go! to save and run the query. The query is automatically displayed in the Search text
box and run.
To save the query without running it, click the icon. The Save query dialog box opens.
For more information, see "Saving a Query" on page 120.
Nested Conditions
You can create search queries with nested conditions in the Advanced Search dialog box. To do
so, click the operator under which you want to nest the next condition and add the condition
as described in "Accessing Advanced Search" on page 95.
For example, use the steps below to add the following query:
( ( agentAddress != 192.0.2.1 ) OR ( agentHostName STARTSWITH "as" AND
destinationAddress IS NULL ) )
Note: Color block views are not available in the dark theme display.
Vertical color block view for the query in as seen in the previous figure
To change views:
1. Click Channels > Event Search to open the search page and select an open Search tab or
open a new tab.
2. Click Advanced Search to open the Advanced Search tool.
3. Click Display and select the view of your choice.
Search Helper
Search Helper is a search-specific utility that automatically displays relevant information based
on the query currently entered in the Search text box.
Search Helper is available by default. If you do not want the Search Helper to display
information automatically, click the “Auto-open is ON” link (in the Search Helper window). The
link toggles to “Auto-open is OFF”. To access Search Helper on demand (once it has been
turned off), click the down arrow button to the right of the Search text box.
Autocomplete
The autocomplete functionality provides full-text keywords and field suggestions based on the
text currently entered in the Search box. The suggestions enable you to select keywords, fields,
field values, search operators, or metadata terms from a list instead of typing them in, thus
enabling you to build a query expression more quickly.
When you start typing, the suggestion list displays many types of entries. Event IDs and
timestamps are not supported by the autocomplete feature, so the dates, times, and Event IDs
will not be included in the suggestion list. As you continue to type, the suggestions narrow to
include only the relevant items.
l If you enter a field name, the suggestion list includes operators and possible field values.
l If you enter a pipe (|), the suggestion list displays operators.
l If you enter an underscore, the suggestion list displays metadata terms, such as _
storageGroup or _peerLogger.
l If you enter a keyword or a field value, the suggestion list displays a count.
l The count represents the number of values stored for a field. The count is dependent on
many factors and may not be exact. It does not indicate how many events might match the
query. Many factors determine the number of event matches, including the time range,
search constraints, and search operators for the query.
Search History
The search history displays recently run queries that match the currently entered search. Click
a recent query to run it again.
Examples
Lists examples relevant to the latest query operator you have typed in the Search text box.
Usage
Provides the syntax for the search operator.
Help
Provides context-sensitive help for the last-listed operator in the query that is currently typed
in the Search text box. Additionally, click the icon to launch the online Help.
Note:
l The fields displayed in the search results vary based on the selected fieldset. The fields you
see may differ from the ones displayed in the documentation.
l Command Center Search enables you to search for events that have been stored in the
database. However, Active Channels enable you to view events as they come in, before they
are stored. During times of high event input, you may be able to view events in Active
Channels before they are available for search. Should this occur, wait a few minutes and try
the search again.
sqlgenerator.querystr.addnullcondition = true
Note: This option is only displayed after you have run a search in this session.
3. Specify a query expression in the Search text box using one or more of the following
methods. Refer to "Query Expressions" on page 74 for information on how to create a
valid query expression.
a. Type the query expression in the Search text box. For information about building a
query expression, including lists of applicable operators, see "Elements of a Search
Query" on page 73.
b. When you type a query, Search Helper enables you to build the query expression by
automatically providing suggestions, possible matches, and applicable operators. See
"Search Helper" on page 99 for more information.
c. Use these guidelines to include various elements in a search query:
l To view the fields in the schema, see "Viewing the Default Fields " on page 186.
l Metadata terms (_storageGroupzo or _peerLogger)
Enter _s (for storage group) or _p (for peers) in the Search text box to obtain a
drop-down list of constraint terms and operators.
For information about storage groups and peers, see "Storage" on page 156 and
"Peers" on page 187.
l
Note: If your query expression includes multiple storage groups to which search
should be constrained, make sure that the group names are enclosed in square
brackets; for example, _storageGroup IN [“SGA”, “SGB”].
l Click Advanced Search. (See "Using the Advanced Search Tool" on page 95 for more
information.) Use this option to specify storage groups and peers to which the
search should be limited.
d. Click the icon to load a search filter or a saved search. Select the search filter or the
saved search from the displayed list and click Load+Close.
For more information, see "Saved Queries (Search Filters and Saved Searches)" on
page 120 and "Predefined Search Filters" on page 122.
4. Click Go!
The search results are displayed in the bottom section of same screen in which you ran the
search. For more information about how search results are displayed and the various
controls available, see "Understanding the Search Results Display" on page 106.
5. You can save the search as a search filter or saved search. Click the icon to do so. For
more information, see "Saved Queries (Search Filters and Saved Searches)" on page 120.
Granting Access to Search Operations and Event Filters Page 104 of 231
User's Guide
Chapter 4: Searching for Events in the ArcSight Command Center
Note: If a query includes chartable operators such as chart, rare, or top, and you cancel the
query, a chart of the partial results is not displayed. Additionally, if a query includes the head,
tail, or sort operators, partial results are not generated.
A search operation can take time when millions of events need to be searched. When the first
screen of events that match the specified conditions is available, the system automatically
pauses the search and displays the matched events. By default, 25 events are displayed on one
screen. Event data is categorized by field name with each field displayed as a separate column,
as shown in the following figure. For example, time when the event was received on the
system (Event Time) is displayed under Time (Event Time). Each event is also available in its
raw form and can be viewed by clicking the icon in the left most column.
To see all raw events, click All at the top of the Search Results display. To collapse raw events,
click None. The column width for each column is adjustable.
To see the next screen of events, click ; or to go to the last page. After you are past the
first screen of events, you can click to go back to the previous screen; or to go to the first
page.
To change the number of events displayed per screen, open the Events per Page drop down
menu and select the number of events to display.
The Search Results page displays a histogram that provides a graphical representation of the
events that match a search query. The distribution is based on the time range specified in the
query. That is, the X-axis represents event time and Y-axis represents the number of matching
events.
Drill down to events in a specific time period by clicking the histogram bar representing the
time period. When you mouse over a bar in the histogram, the number of events scanned and
number of events matching the query and the time it took to run the search is displayed.
Note: IPv6 Address columns cannot be expanded enough to see all of the address. If you select
the plus sign on the left to see the raw event, you can see the entire IPv6 address.
Below the histogram, events are shown in table form, one row per event. Terms that match
your query are highlighted in blue to make it easy to see why an event matched the query.
To view the raw event of a listed event, click the icon to the left of the matching event. You
can also view the Syslog raw events in a formatted column called rawEvent if you have enabled
the “Populate rawEvent field for syslog events” option on the Search Options page, as
discussed in "Tuning Search Options" on page 182. Also, see "Fieldsets" on page 84 to learn
more about the rawEvent field.
As you roll the mouse over other terms in the events table, they highlight in green. The user
interface allows you to drill-down into the displayed search results by clicking a green-
highlighted term to add it to the current query. For example, if you search for “login” and roll
over the word “fail” in the search results, “fail” will highlight in green. Click the word “fail” to
change the query to “login AND fail.” You can also highlight and copy text from any displayed
column. This feature is handy when you need to copy an IP address or a URL. (Highlight the
term by scrolling over it. Then, right-click your mouse to display the Copy option.) You can
select any fields from the search results. Search results are sorted by receipt time.
Use these keyboard shortcuts to select terms from the displayed search result columns or the
raw events to refine your search query:
l Click the term in search results to add the selected term to the search query, and rerun the
search.
l Ctrl+click to replace the entire search query with <field name> + "CONTAINS" + <selected
term>, and rerun the search.
l Alt or Shift + click the term in search results to add NOT to the term, and rerun the query,
thus eliminating the events that match the term you selected.
l You can add multiple NOT conditions by holding the Alt key and selecting terms in search
results. When multiple conditions are added, they are joined by AND operators.
l You can combine Ctrl+Alt, (or Ctrl+Shift) to replace the search query with NOT + <field
name> + "CONTAINS" + <selected term>.
A Field Summary panel is displayed on the left side of the matched events. This section lists the
fields that occur in matching events and the number of unique values for each in those events.
For more information, see "Field Summary" on page 111.
Field Description
parser Indicates whether an event was parsed or not, and which parser was used.
If the event was parsed, this field contains the name of the parser. If the event was not parsed
successfully, this field contains “Not parsed”. If no parser is defined for the source type or if there is no
source type, the field is blank.
source The type of file from which the event was received, as defined on the Source Type page (Configuration >
type Event Input > Source Types).
If no source type was applied when the event was received, this field is blank. You can control whether
this field is displayed from the Search Options tab.
source The name of the log file from which the event was received. For example, /opt/mnt/testsoft/web_
server.out.log.
If no source was applied when the event was received, this field is blank. You can control whether this
field is displayed from the Search Options tab.
User-defined fields are created when a search query includes operators such as rex, extract,
and rename. See "Search Operators" on page 196 for information on these operators.
These fields are displayed as additional columns in the All Fields view (of the System Fieldsets).
To view only these columns, select User Defined Fieldsets from the System Fieldsets list.
If you view the Search Results using the Raw Event fieldset, even though the rawEvent column
displays the raw event, this column is not added to the database and is not indexed. Therefore,
you can only run a keyword (full-text) or regular expression to search on the event.
l If you need to use the histogram view the results of a search query that matches more than
one million events, adjust the time range specified in your search query so that fewer than
one million are matched to obtain a complete and meaningful histogram. Or, use a pipeline
operator such as top, head, or chart to further refine search results so that the total
number of hits is fewer than one million.
Note: The Auto Update checkbox is available only when search results are shown. It will be
available then, even if there were no hits.
When you click on a chart value (a column, bar, or pie section), the existing search query is
modified to include the WHERE operator with the field name and value, and automatically
rerun.
If you need to return to the original query from the drill-down screen, use the Back function of
your browser.
Field Summary
If the Field Summary checkbox is marked, when a query is run the Field Summary panel lists
the CEF and non-CEF fields that occur in matching events and the number of unique values for
each in those events. This panel is only displayed for queries that do not generate charts. If a
peer search is performed, the summarized field values include counts from peers.
Granting Access to Field Summary Operations
Access to Summary Operations is granted at the user group level. Edit the Access Control List
(ACL) for the group and add the following permission to the Operations tab in the ACL Editor.
View Field Summary:
/All Permissions/ArcSight System/Summary Operations/Field Summary Read
Note: The Discover Fields option is useful for events that have raw, unstructured (non-CEF) data,
such as events from a peer Logger.
However, note that the Discover Fields option in the ArcSight Command Center Search feature is
not supported. To use the Discover Fields option, run the search from Logger.
By default, the Field Summary and its Discover Fields options are disabled. If you need to
enable the Field Summary for all searches on your system, change the default value (“No”) on
the Search Options page (Administration > Search > Search Options) to the desired value for
this option, as shown in the following figure. (The Discover Fields is not supported in this
release. To use the Discover Fields option, run the search from Logger.)
However, if you need to use the Field Summary only occasionally—not for all searches—you
can enable the option for one-time use on the user interface page from where you run the
Search query. To do so, click the Field Summary checkbox above the Search text box before
clicking Go! to run the query. Selecting these options on the Search page overrides the setting
for these options on the Search Options page.
To auto-discover fields, the raw events must contain data in the “key=value” format, and none
of these characters can be the first character of the “value”: comma, space, tab, and
semicolon. For each “key=value” pair found in a raw event, a new field of the name “key” is
created. The Field Summary includes a summary of the values for all the new fields under the
Discovered Fields section. The discovered fields are assigned the type “String” by default. The
auto-discovery capability works only if at least 2,500 of the first 10,000 matching events
contain “key=value” pairs. If this threshold is not met, auto discovery is automatically turned
off. However, this threshold does not apply if there are less than 10,000 matching events; in
that case, fields are discovered regardless.
You can drill-down on any of the listed fields or a specific value of the listed fields. For example,
you might want to view all events containing destinationAddress (specific field) or you might
want to view events of name “Report updated” (specific value in a field).
When you click one of the fields under Selected the Field Summary, various options become
available. The available options vary by field type. When field is the data type String (Text), you
can choose the following options Display events containing <field>, view the top 10, or view
the values by time. When field is the data type Number (Long, Integer or Double), you can also
perform mathematical operations such as average, min, and max. For more information about
the available fields and data types, see "Viewing the Default Fields " on page 186.
Every time you run a query or drill-down on a specific field or value, a new query using the
newly selected criteria is run and the Field Summary list is updated.
You can limit the search to a specific field or filter the listed fields by specifying a filter criteria
in the Search Filter text box located at the top of the Field Summary panel. For example, if you
want to see fields that begin with de, enter de in the Search Filter text box.
To go back to the default list, click the icon. You can sort the field list by Name or Count. To
do so, select the sort criteria from the drop-down menu.
Refining and Charting a Search from Field Summary Page 114 of 231
User's Guide
Chapter 4: Searching for Events in the ArcSight Command Center
Refining and Charting a Search from Field Summary Page 115 of 231
User's Guide
Chapter 4: Searching for Events in the ArcSight Command Center
Note: If you conduct a search using peer events and then add these events to case, you cannot
visualize these events in a case. You do not have permission to view peer events.
Option Description
Save to The file is saved to a local system or it is sent to the browser for viewing or saving.
local disk
Save to The file is written to local storage.This option saves the results to a directory accessible to every
ArcSight ESM user regardless of permissions. To prevent that, add the following property to
Command /opt/arcsight/logger/current/arcsight/logger/user/logger/logger.properties:
Center search.export.saveToServer.enabled=false
Restart all ArcSight services after editing the file.
For more information, see the ESM Administrator's Guide.
Export file (Available only when the “Export to remote location” option is selected)
name Specify the name of the file to which events will be exported.
If a file of the specified name does not exist, it is created. If a file of the specified name exists
and the Overwrite box is not checked, an error is generated. If the Overwrite box is checked,
the existing file is overwritten.
You do not need to specify an extension. The extension .pdf or .csv is added for you based on
the file format you selected.
Fields A list of event fields that will be included in the exported file.
By default, all fields are included.
You can enter fields or edit the displayed fields by deselecting All Fields.
To export fields created as a result of rex, extract, rename, or eval operators, or field created
when a parser is applied to an event, ensure that *user is selected in the Fields list.
Option Description
Include only Only include CEF events in the exported search results.
CEF Events
Include Include base events for Alerts in the exported search results.
base events
(alerts only)
5. Click Export.
Saving a Query
To save a query:
1. Define a query as described in "Searching for Events" on page 102 or "Using the Advanced
Search Tool" on page 95.
2. Click the Save icon ( ) and enter a name for the query in the Name field.
3. In the Save as field, select whether to save this query as a Search Filter, as a Saved Search ,
or as a Dashboard panel.
4. Select Search Filter to save just the query.
5. Select Saved Search to save the time range along with the query.
Optionally, specify when to run the query by selecting Schedule it. If you mark schedule it,
you can save it as a Scheduled Search or a Scheduled Alert.
If the search query includes an aggregation operator such as chart or top, a third option to
save the query for a Dashboard panel is also displayed. If you select this option, you need
to enter the following parameters.
Saved Queries (Search Filters and Saved Searches) Page 120 of 231
User's Guide
Chapter 4: Searching for Events in the ArcSight Command Center
Parameter Description
Title Enter a meaningful name for the panel that will be added to the Dashboard.
Saved Select an existing saved search from the drop-down box that will be overwritten with this
search query.
OR
Select “New saved search” to create a new saved search query. Enter the new name in the text
box.
Dashboard Select an existing Dashboard from the drop-down box to which the Search Results panel will be
added.
OR
Select “New dashboard” to add the Search Results panel to a new Dashboard. Enter the name
of the new Dashboard in the “Dashboard Name” field.
Chart type Type of chart to display matching events. You can select from:
Column, Bar, Pie, Area, Line, Stacked Column, Stacked Bar.
Default: Column
6. Click Save.
7. If you selected Schedule it, a dialog box opens asking if you want to edit the schedule
settings.
8. Click OK to edit them now or Cancel to edit them later.
Note: In some cases, the browser adds a message to this dialog box asking if you want to
prevent the page from creating additional dialogs. If you select this option, you might be
unable to proceed. In that case, close the browser and restart it.
9. Edit the scheduling options and then click Save. For more information about the Scheduled
Searches and the Schedule options, see "Scheduled Searches" on page 177.
Events use case High and Very High Severity Events (Unified)
Password Changes
SAMBA Events
SSH Authentications
Indexing
Events are indexed for full-text search and for field-based search. For full-text (keyword)
search, each event is tokenized and indexed. For field-based search, the event fields are
indexed based on a predetermined schema.
Note: The eventId field and the DATETIME fields such as deviceReceiptTime and endTime are not
indexed and, therefore, are not available for full-text search. To search these fields, use a field-
based search.
Field-based Indexing
Field searches utilize the schema fields.
You can search any field defined in the schema. A list of the schema fields, along with their
field descriptions is available from the Administration> Search > Default Fields tab. For
instructions on how to view the fields, see "Viewing the Default Fields " on page 186.
Note: Not all ESM event information is available for searching. To search for fields not included
in the Default Fields list, use the ArcSight Console through a query viewer. Refer to the Query
Viewers topic in the ArcSight Console User's Guide.
Note: In Command Center, if you have a report that is currently in the process of generating
and you select and run another report, it cancels the first report.
If you run a report that takes more than approximately 30 minutes to execute, Command
Center may display a Manager Unresponsive error. The report continues to run on the
server. You can view the finished report in the Archives > Archives tab > reports tree >
[user]'s Archive Reports folder > Temporary Reports folder (the [user] string is the currently
logged in Username).
Report Parameters
For regular reports ( ) you can change the output parameters by double-clicking the report
name. It brings up a dialog that enables you to change selected parameters before running it.
Parameter Description
Basic Tab
Start Time To set a start time that overrides the one set in the query, specify a start time here.
For example, if you want all the report elements to report on events for the past 2 hours, you can
create a start-time parameter of $Now-2h, which sets both table and chart start times to $Now-2h.
This setting is saved locally as part of the report definition, not as part of the original query upon
which the report is based.
End Time To set an end time that overrides the one set in the query, specify an end time here.
This setting is saved locally as part of the report definition, not as part of the original query or trend
upon which the report is based.
Other The other options that might appear vary according to the report, for example you might see License
options Type for licensing reports, or Row Limit, Filter By, or other options with choices appropriate to the
report.
Run as User Run the report as a particular user. From the drop-down menu, select the user name by which you
would like to run the report.
For example, this option would allow an administrator for an Managed Security Service Provider
(MSSP) to run report for a customer. The administrator would need write permissions to the user.
Email Tab
Subject Specify the subject on the notification. Defaults to the report’s Name attribute (denoted by
$ReportName). If you want to use a customized subject, type the text either in addition to the
default or to replace the default entirely.
Addresses Send the report to one or more comma-separated or semicolon-separated e-mail addresses. This
option does not require the recipient to be an ArcSight Console user.
Note: The recipient will only see his or her e-mail address in the To field even if there are multiple
recipients for this report.
Parameter Description
To You can have the report sent as email to one or more Console users.
From the drop-down menu, select the Console users to whom the report should be e-mailed. The
selection list is read from the Users resource.
The recipient will only see his or her user name in the To field even if there are multiple recipients
for this report.
Note: By default, an e-mail is sent even if the report is empty.
Archive Tab
Save Output Check this box to elect to save (archive) the report results. This enables you to retrieve it later for
to Archive viewing without having to re-run it. Reports that are run on demand are saved on the Archives tab
just like scheduled reports. If the Save Output option is chosen for an on-demand report, the
archived report has an expiration date of 6 months from the time it was run (by default). If the Save
Output option is not chosen for an on-demand report, the report is maintained in the archive for
one day only.
Archived reports can also be sent to a notification group after the scheduled report is run.
For information on how to archive and maintain reports, see the ArcSight Console User's Guide.
Name By default the name of the report is ${Today}/${ReportName}, where Today is today’s date/time and
ReportName is the name given to the report when it was created. You can type in an different
name.
Expiration The report is archived until the date/time selected here, after which the archive is deleted.
Time
Parameter Description
Presentation Tab
Format From the drop-down menu, select one of the following report output formats:
l pdf - Displays the report as an Adobe PDF file.
Note: In Internet Explorer, reports displayed in PDF are always on top. If you open the Help >
About dialog or another report parameters dialog, it might be partially hidden by the PDF
report. However, you can drag these dialogs out from under the PDF report and they work
normally.
l xls - Generates a Microsoft Excel file for tables and charts.
Note: XLS reports you run with Microsoft Excel 2002 might have page break format problems
(misalignments, column spillover) due to default page size settings in Excel. To correct this
problem, open the resulting XLS report in Excel, choose File > Page Setup from the menus,
change the paper size to Letter (instead of Legal), and click OK to save your changes. The report
has the appropriate page break formatting. This problem does not occur in newer versions of
Microsoft Excel.
Note: XLS report formats display speedometer charts as pie charts. This is a known limitation in
Microsoft Excel.
l rtf - Produces a rich-text format document.
l csv - Creates tabular data as a list of comma-separated values.
Note: Reports generated in CSV format are not the full equivalent of exports to other formats
like PDF or HTML. CSV format is useful for loading report data into a spreadsheet for further
manipulation. Since CSV is meant to contain tabular data, only the table data of a report is
normally useful. Therefore, ArcSight exports only the table data portion of a report to CSV
format, ignoring any other report information such as charts or text, including report titles.
l html - Generates the report in HTML format.
Your selection affects your choice for e-mail formats.
Archived Reports
The archived report results that are available were archived in the ArcSight Console. Whenever
you run a report it is archived for six months. For more information, see the ArcSight Console
User's Guide.
NOTE: If a case has not been locked, it is possible for multiple users to edit it at the same time. If
another user saves changes to a case while you are editing it, you will be prompted that the case
has changed.
View Case Notes and Updates — You can view case details. Highlight a case and click History
above the list.
To export an ESM case as an XML file:
If you have an integration to an external case management system, you can transfer cases from
the Command Center to the external system as XML by doing the following.
1. From Cases, highlight your case and click Export.
2. The output file is stored in the Manager’s archives/exports.
Note: You are responsible for configuring your external case management system to consume
the XML file.
Attributes Subtab
Field Description
Case:
Display ID This ID is assigned automatically when you create a case and save it. For imported cases, it is
provided by the external tracking system.
Ticket:
Ticket Type Select from a drop-down list that includes Internal, Client, and Incident types.
Stage Select the workflow stage of ticket; default selections include Queued, Initial, Follow-Up, Final,
and Closed.
Attributes Subtab
Field Description
Frequency Select how often the reported issue occurs. Values assigned are 0 (never or once), 1 (less than 10
times), 2 (10 to 15 times), 3 (15 times), 4 (more than 15)
Operational Select the impact of the reported issue. Values assigned are 0 (no impact), 1 (no immediate
Impact impact), 2 (low priority impact), 3 (high priority impact), 4 (immediate impact)
Reason for Assign a value of 0 (False Positive), 1 (True Positive - Resolved), 2 (Duplicate), 3 (True Positive -
Closure Other)
These values are placeholders for you to customize, if you want to use this field.
Refer to the Cases Editor UI Customization Tech Note. Familiarize yourself with the entire process
of UI customization. Applicable information is covered in the topic, "Customizing Field Labels,"
specifically the procedure "To replace a list of string options."
Category of Default is 0 (None). The value assigned is a placeholder for you to customize, if you want to use
Situation this field.
Refer to the Cases Editor UI Customization Tech Note. Familiarize yourself with the entire process
of UI customization. Applicable information is covered in the topic, "Customizing Field Labels,"
specifically the procedure "To replace a list of string options."
Reporting level The level number is calculated by the system based on the other Ticket values entered.
Incident Information:
Detection Time Automatically assigned based on the first event that is added to a case. Time is based on the
Manager’s system time. Once assigned, the value does not change even if you add events or
remove existing events.
Estimated Start Automatically assigned based on the Manager Receipt Time (MRT) of the oldest event attached to
Time the case, even if more recent events have been added to the case prior to this oldest event. If you
remove this oldest event from the case, Estimated Start Time takes the MRT of the next oldest
event in the case, and so on. If you remove all events from the case, the field will be blank.
Estimated This is a user-entry field to denote the date when the case is resolved. Select a timestamp from
Restore Time the calendar popup.
Common
Resource ID Read-only field that shows the ID that the system assigned to this resource when it was created.
External ID An identification string suitable for, and which can be referenced by, systems outside Command
Center. Common applications of External IDs include appropriate naming for Case and Asset
resources that are tracked in common with defect reporting or vulnerability-management
systems. If your system interfaces with a third-party incident tracking system, such as Remedy,
enter an ID that corresponds to that system. Your administrator can advise you on the correct
values for this field, if applicable.
Attributes Subtab
Field Description
Alias (Display An optional alternate identification string used for referencing resources. If given, this alias
Name) appears in place of the resource's name everywhere it may be seen. Your administrator can
advise you on the correct values for this field, if applicable.
If you use an alternate event naming scheme in your environment, enter an alias for this resource
here.
Version ID The globally unique version ID for this resource. Version IDs are assigned when you export a
resource as part of a package, if the resource has changed.
Assign
Owner Groups A group selected from the Users resource tree. Users gain access to resources according to the
user groups they belong to, and it is also at the Users resource where the administrator creates
and manages user groups. Permissions to view and edit resources are granted to user groups. If a
group owner is specified, the group the owner belongs to is automatically added to the group
assignment; if a user belongs to multiple groups, these groups are added. Any other linked groups
are included in the assignment as well. You can specify a group alone, with no user specified.
Owner Groups will appear on Field Sets of type "Case Field Set' as an optional field, and on Case
queries as a selectable Field. In Rules, the option to select either a User or a Group as the owner
of the case to be created is available; in the Rules context, Owner Groups are displayed only when
you create a new case.
For Case Channels, the Owner Groups field is available to be set as a column.
Notification The user groups selected from the Users resource tree who should be notified about this
Groups resource.
Parent Groups
Parent Group Read-only field that shows the name and path to parent group of this resource.
Creation
Information
Created By Read-only field that shows the user who created this resource.
Creation Time Read-only field that shows the date/time when this resource was created or imported and
installed.
Attributes Subtab
Field Description
Last Updated Read-only field that shows the user who last updated the resource.
By
Last Update Read-only field that shows the date/time when this resource was last updated.
Time
Description Subtab
Field Description
The fields on the Security Classification subtab describe the security classification for a case.
Field Description
Security Classification:
Security Classification Value automatically calculated from other Security Classification field entries.
Code
Field Description
Attack Auto-populated from Security Classification tab. Possible values are P (Physical), O (Operational), I
Mechanism (Informational), and U (Unknown).
Fields on the Attack Agent subtab provide ticket resolution and reporting information related
to the attack agent associated with a case.
Field Description
Attack Agent Auto-populated from Security Classification tab. Possible values are Insider, Collaborative,
Outsider, and Unknown.
Field Description
The fields on the Incident Information subtab provide final incident information associated
with a case.
Field Description
The fields on the Vulnerability subtab provide final ticket resolution and reporting information
related to the vulnerabilities associated with a case.
Vulnerability Tab
Field Description
Vulnerability Auto-populated from Security Classification tab. Possible values are D (Design), O (Operational), E
(Operational Environment), and U (Unknown).
Vulnerability Selections include: EMI/RFI, Insertion of Data, Theft of Service, Unauthorized, Probes, Root
Type 2 Compromise, DOS Attack, User Account, Virus, Illegal Worms, Spams, Replay/Reroute,
Wiretapping, Hardware/Software, Spoofing, and Unknown/New.
The fields on the Other subtab provide miscellaneous ticket resolution and final reporting
information.
Other Tab
Field Description
Events Tab
Field Description
Details tab Shows the value for every field in the event.
Show Fields Filters the list of fields to only those that contain the value that you enter.
Containing
Field Set Select a field set to display. You define Field sets in the ArcSight Console.
Annotations Tab Shows all the annotations for the selected event. You annotate events from the ArcSight
Console.
l Local file — Choose files from your local drive or networked drives.
Note: Depending on your company policies, your administrator might restrict some file
types in your environment, such as .exe, .sh, or. bin.
l ArcSight File — Choose a file from within ESM. Expand the ESM file resource tree to
choose a file resource, then click OK.
l Download — Download attached files to another location. You can only download saved
attachments.
l Detach — Remove the attached file from this list.
Once a file is attached to a case, anyone viewing the case can view details about the file and
download it.
If the case attachment was also added as a shared resource, the file is available in the ArcSight
Manager Files resource folders.
User groups created in older releases (prior to Command Center 6.5c SP1) carry over their
legacy permission to delete cases.
Deleting a Case
Caution: Prior to deleting cases, decide if you want to preserve them after deletion. If so, add
this property (or ask an administrator to add it) in the server.properties file before deleting
any cases:
case.archive_ondelete.enabled=true
The archived deleted cases are stored as read- only snapshots for historical purposes in the
Manager’s archive/cases directory. The filename format of the archived case is
YYYY-MM-DD <deleted case name>.xml
For important details about changing properties files, see the ESM Administrator's Guide.
If you belong to a user group that is authorized to delete cases, you can delete a case. See
"Granting Permission to Delete Cases" on the previous page for related information.
Make sure to unlock the case before deleting it.
3. Select a case.
4. Click History. You can filter the notes or update actions by a selected date or by a specified
user.
5. Click Clear Filter to revert to default filtering criteria.
Note: By default, the Filter Editor places the operator under the selected item in the filter
tree. After you add an operator to the tree, you can click and drag it to a different location.
Note: By default, the Filter Editor places the condition under the selected item in the
filter tree. After you add a condition to the tree, you can click and drag it to a different
location.
Note: By default, the Filter Editor places the operator under the selected item in the filter
tree. After you add an operator to the tree, you can click and drag it to a different location.
Note: By default, the Filter Editor places the condition under the selected item in the
filter tree. After you add a condition to the tree, you can click and drag it to a different
location.
Note: If necessary, and you have the appropriate permissions, you can delete a field set in the
ArcSight Command Center.
Content Management
You must be an administrative user to access this feature.
You may have multiple ArcSight Managers deployed either hierarchically or in parallel across
your enterprise, in widely dispersed geographical locations. Using ArcSight Command Center,
you can manage and synchronize custom content packages across all of these Managers. For
example, you have ArcSight Managers in San Francisco, London, and Tokyo. You update some
rules on the Tokyo Manager and can include those rules in a custom content package. Then,
using Content Management, you can synchronize the package to the ArcSight Managers in San
Francisco and London.
Synchronization of a custom content package can be performed either manually, at an
administrator’s command, or automatically, at regular scheduled intervals. Synchronizing
packages from one ArcSight Manager to another is also referred to as pushing. The Manager
that is the source of custom packages is called the publisher, and the peers receiving packages
are called the subscribers.
l All peers (that includes the publisher and subscribers) must be at the same Command
Center version. From the publisher’s standpoint, the subscriber list will consist only of
peers at the same version.
l Not all ESM resources, are supported for synchronization. For a list of eligible resources,
see the ArcSight Console User's Guide.
l When creating packages for synchronization, make sure these packages are created in the
contentsync format.
Caution: Before publishing ESM packages to ESM peers, make sure these packages were
created in the same ESM version. If the packages were created in an older version, first
upgrade the source ESM, so that the resources are properly validated as part of the
upgrade process. Then add these validated resources to contentsync-formatted packages.
If you do not upgrade, publishing the packages to subscribers may succeed, but the
resources' functionality may fail when subscribers start using the resources.
Tip: Custom content packages are created and managed on the ArcSight Console . For
information on creating and managing packages, see the ArcSight Console User's Guide.
Packages Tab
The Packages tab lists all custom content packages currently available for distribution. Each
package listed includes the following descriptors:
l Package: Name of the package.
l URI: Path indicating the location of the package file.
l Last Push: Date of the last package push.
l Push Status: Indicates the success or failure of the latest push attempt. Click the link to
view details. Note that if a subscriber is not online, the push date displays in the Push
History, but not the push status.
l Follow Schedule: If selected, the package will be automatically pushed to subscribers at
the scheduled time.
l Description: Brief description of the package.
Click the header of the Package, URI, or Last Push columns to sort the tab contents by that
column. Click Refresh to show the first package in the table.
Note: Synchronization is not available for system content packages. It is available for custom
content packages, but the following resources are not supported and the outcome is
unpredictable: Actors, Assets or Asset Ranges, Cases, Connectors, Partitions, Active or Session
Lists, Database Table Schemas, or Users.
For a list of packages that are eligible for synchronization, see the ArcSight Console User's Guide.
Subscribers Tab
The Subscribers tab lists all peers to which packages may be pushed from this ArcSight
Manager. By default, subscribers must be of the same Command Center version as the
publisher.
The list of subscribers includes the following descriptors:
l Subscriber: Host name of the Command Center subscriber. (Although Loggers may be
enabled as peers, a Content Management subscriber must be an ArcSight Manager.) Click a
subscriber name to view the push history of all packages pushed to that subscriber.
Tip: If the Push Status field in Push History is blank, the subscriber might be offline.
Tip: To push a package selectively (that is, to only some subscribers instead of all), ensure
that the Active checkbox is selected only for the subscribers to which you wish to push.
Click the header of the Subscribers column sort the tab contents by that column. Click Refresh
to refresh the page view.
Note: To enable peers, click the Peering link on the Subscribers tab.
Schedule Tab
The Schedule tab includes controls for setting automatic push intervals. If Follow Schedule for
the package is enabled on the Packages tab, the package push will be performed automatically
at the chosen interval. All packages (with Follow Schedule enabled) are pushed on a single
schedule.
Select one of the following settings for a push schedule:
l On/Off: If On, scheduled pushes for packages are enabled. If Off, the package will not be
pushed automatically, even to Active subscribers.
l Hourly: The push is performed on the hour (:00), or, if you specify minutes, at :15, :30, or
:45 minutes past the hour.
l Daily: The push is performed once every 24 hours at the selected time.
l Weekly: The push is performed once every 7 days at the selected day and time.
Note: In order for a package to be pushed from an ArcSight Manager to a subscriber, both
Managers must be in the same mode (for example, FIPS to FIPS).
Note: A package may not be pushed if it includes required features which are not enabled by the
license on the subscriber.
Note: Once successfully pushed, a package is always installed on the subscriber, even if it is
not installed on the publishing Manager. To see the status or history updated, click Refresh.
Use all other ArcSight Managers as subscribers. Subscribers would receive the definitive
packages from the publisher.
l Schedule automatic pushes prudently. Exercise caution when scheduling frequent
automatic package pushes. Package pushes overwrite previously-pushed packages on
subscribers. For example, if an automatic push occurs hourly, subscribers would receive
packages (and have their own versions overwritten) every hour.
l Retry failed pushes. Occasionally, an automatic or manual package push can fail. If a
package push fails, uninstall the package on the subscriber and then retry the push.
l Reduce network impact. Package pushing to multiple subscribers is performed in parallel.
As a result, heavy, simultaneous package pushing runs the risk of a network impact.
Schedule or perform manual pushes only during times when network demand is low.
l Audit events. Audit events are logged in several circumstances, which can make
troubleshooting easier. These circumstances include when a peer becomes a publisher or
subscriber, a package is pushed manually, a package push is scheduled, or after the success
or failure of a push. For a complete discussion of audit events, see the ArcSight Console
User's Guide.
l Backups. As with all critical, sensitive systems, run frequent backups on your ArcSight
Managers to ensure that their content can be easily restored, if necessary.
Tip: You can resolve push failures by setting larger values in server.properties.
o Some failed pushes which include Queries can return an error: Cache size for
Queries is insufficient to import this archive . Fix this issue by changing
the value in server.properties of resource.broker.cache.size.Query to 3000.
o A large package push may fail because of the value of archive.export.max.size .
The default value is 30000 , but you can increase this value to accommodate large
packages.
For more information about setting values in server.properties , see the ESM
Administrator's Guide.
Overview
Incoming events are stored in the CORR-Engine database for search and correlation analysis. By
default, all events are sent to the Default Storage Group, where they are retained for thirty
days, after which they are deleted. You can use the storage and archive functionality to send
events from different connectors to different storage groups and configure the retention
period of each storage group. Additionally, you can archive the daily events from each storage
group as needed, so that you can retain all necessary events as long as needed. You can create
one archive per day per storage group.
Events that are online in the CORR-engine are available for search and correlation analysis.
Unless an archive is created for them, events exist online in the CORR-Engine database only.
Events remain online in the CORR-Engine database until their retention period expires. Once
events have passed their retention period and are removed from CORR-engine database, one
of two things might happen.
l If they have been archived, they will no longer be searchable, but will still be backed up in
off-line storage. These archives can be made searchable again, if necessary.
l If they have not been archived, they are permanently deleted.
The following figure depicts the flow of daily event archives over time.
In the figure above, events come in to event storage, on the left at the top. They are kept in the
online database until the limits of the retention period or space, and then deleted. As you
archive daily events, they are copied to the archive storage area, on the right. They remain in
both locations online until their retention period expires. After the retention period expires,
archived events remain in offline storage.
All the daily events in online event storage, plus any offline archives that have been made
searchable are available for search and correlation analysis.
The Storage and Archive page includes four tabs:
l "Storage" below — The Storage tab allows you to create and edit storage groups, set their
retention periods, specify the locations where event archives will be stored, and select the
time for daily archive jobs to run. Additionally, you can view and edit the allocated size of
the storage volume from here.
l "Storage Mapping" on page 164 — By default, all events are saved in the Default Storage
Group. This tab allows you to send events to different storage groups based on where they
come from.
l "Alerts" on page 166 — Your system can email notifications to a user when event storage is
becoming too low. This tab allows you to configure the thresholds and recipients for these
storage alerts.
l "Archive Jobs" on page 166 — This tab provides a list of all events in the system as daily
archives for each storage group. From here, you can filter the list to find a particular day’s
events and create and manage the daily event archives for each storage group.
Note: Events that were not archived before their retention period expired are not
displayed, because the are no longer in the system and can not be made available.
Storage
Location: Administration > Storage and Archive > Storage tab
On the Storage tab, you can add and edit storage groups, view the current and maximum
system storage, increase the allocated size of the event storage volume, and set the time for
archive jobs to run.
The Maximum Size of the event storage volume, shown in the center, below the storage
groups, is the smaller of:
l The maximum size specified in the ESM license property,
logger.limit.maximum-capacity
l The value is calculated based on disk size and the reserved space
(Maximum Size = “Size of /opt/arcsight” x 0.9 – “System Storage” – “Event Archives”)
o The size of the /opt/Archive partition is controlled by the size of the disk drive.
o You set System Storage Size and Online Event Archive Size when you installed ESM.
Allocated Size refers to the amount of disk space actually set aside for the event storage
volume. (The text that appears if you hover over the question mark next to Allocated Size uses
the word “memory.” It should say “disk space.”) This is the value called Event Storage Size that
is set on the CORR-Engine Configuration panel of the Configuration Wizard, during installation.
You can increase this size, but you cannot make it smaller.
If you get a new license that allows for additional event storage, it increases the Maximum Size
value, if you have that much disk space available. If so, you can increase the Allocated Size to
reflect the new maximum. So if you are licensed for 12 TB, and your hard disk is large enough,
you can edit the Allocated Size to be that large, and add or enlarge storage groups to take up
the 12 TB Allocated Size.
Caution: The 12 TB (or licensed determined) storage limit includes any events in an online state,
whether these events are in current memory or archives that have been brought back online.
Be sure to take into account that any events that are brought from an offline archive into the
online archive count as part of the total storage limit. Keep in mind that the sum of the
combined storage group size (Total Group Size) and the online archive total size (searchable
archives) cannot exceed the Maximum Size.
The offline archives you bring back online must not encompass the entire storage limit. Use
discretion when bringing offline archives online, and be sure to make them offline again when
you are done working with them.
Conversely, if you get a bigger hard drive and allocate that space to the/opt/arcsight
partition, it increases the Maximum Size value (at the next restart), if your license allows that
much storage. If so, you can increase the Allocated Size to reflect the new maximum.
You can add a maximum of four storage groups and expand them until they equal the
Allocated Size. If you need more space, increase the Allocated Size to equal the Maximum Size.
Then increase the size of one or more storage groups until the new Allocated Size is reached.
Storage Groups
You can have a maximum of six storage groups, two that come with your system, and four that
you can create.
l Default Storage Group — By default, all incoming events are captured in the Default
Storage Group. Along with the incoming events, it also includes ESM internal health events
and ESM internal events. After installation, the size of this group does not fill available
space. That is so that you have room to create other groups. You can change storage group
size, but you cannot make them smaller than 5 GB.
l Internal Storage Group — This storage group supports the ability to peer with Loggers,
which have an Internal Storage Group.
l User-created storage groups — You can add up to four storage groups and configure them
as needed.
Each storage group takes up part of the total allocated size of the storage volume.
Therefore, the combined storage group volume cannot exceed the total allocated storage
volume.
Caution: The sum of the combined storage group size (Total Group Size) and the onlinearchive
total size (made searchable archives) cannot exceed the Maximum Size. Use discretion when
bringing offline archives online, and be sure to make them offline again when you are done
working with them.
When determining the size of a storage group, consider the total allocated storage size. For
information on changing the storage volume size, see "Allocating Storage Volume Size" on
page 162.
Having different storage groups enables you to implement multiple retention policies, because
each storage group can have a different retention policy and storage mapping. Storage
Mappings send events from selected connectors to separate storage groups, and are covered
in detail in "Storage Mapping" on page 164.
By default, all incoming events are stored in the Default Storage Group. You can add new
storage groups and create storage mapping to send events from different connectors to any
storage group, except the Internal Storage Group.
For each storage group, you can define a maximum size and a retention period to retain
events. Older event archives are deleted from the storage group when they reach the age set
as the retention period or storage runs out of disk space, whichever comes first.
Note: When creating a storage group, do not nest this new group under an existing group. The
archiving path of one group must not be suborinate to the archiving path of a another storage
group. Nesting storage groups increases the archive space utilization for the existing parent
group.
l If a day’s events have been archived when this deletion occurs, the daily archive will still be
in the Archive Jobs list, with the Offline status. A daily event archive will only be removed
from the Archive Jobs list if it has not been archived by the time its retention period expires
or the storage group exceeds the maximum size. For more information about archive jobs,
see "Archive Jobs" on page 166.
l Once events are older than the specified retention period, the oldest events are deleted at
the next retention cycle. The retention process triggers periodically, therefore, events
might not be deleted immediately when the retention period expires.
l If storage group space runs out, the oldest day’s events are deleted each day, even if they
have yet to reach retention age.
l If the number or size of daily events is high or your retention period is sufficiently long, you
may run out of disk space allocated for Event Storage before the oldest events reach the
end of the retention period. When the Event Storage size exceeds the maximum size limits,
the events will be immediately truncated. If that happens, the oldest events are deleted
first.
Caution: It is not likely that you will ever need to turn archiving off. When you turn archiving off,
no event archives are created, and when the retention period expires, the event data is lost
forever. Turning it off turns it off for all storage groups regardless of any other settings.
Making copies of event data before the retention period expires is not useful. If Command
Center does not create the archive, the necessary metadata is absent and restoring event data
backed up by other means does not work.
Caution: If you do not follow the archiving schedule, you are not archiving that group at all. All
events in that group older than the retention period are lost forever. The only circumstance
under which you would want to turn off archiving for a storage group is when the group is
specifically set up to collect event data that you will never need later.
Note: If you do not turn archiving on for a storage group or archive it manually, events are
deleted when they reach the end of the retention period.
7. Specify the Archive Location. Event archives are saved to the specified directory. This can
be a path to a local directory or to a mount point on the machine on which the system is
installed.
8. Click Save to add the storage group, or Cancel to exit without saving.
Note: The combined Maximum Sizes of all storage groups cannot exceed the Allocated Size of
the Storage Volume. When increasing the size of storage groups, consider the Allocated Size of
the Storage Volume.
Note: When allocating the total storage volume, the installation reserves about 10% of the total
disk size for the operating system and installed software, by using the following formula:
MaximumSizeOfStorageVolume = TotalDiskSize * 0.9 - SystemStorageSize - EventArchiveSize
Storage
Area Size Purpose
System Configured Includes static content and resources. There is no retention period; this data is
Storage during always retained.
installation, can
You can see the Current size and the Maximum size at the bottom of the "Storage"
range from 3 GB
on page 156 tab.
to 1500 GB.*
If the current size reaches the configurable warning and error levels, and you have
configured "Alerts" on page 166, the system issues an email warning that available
space is getting low.
* Size is limited by smallest of 1500 GB, the license limit, and the disk size.
Event Configured Includes collected daily events that accumulate until the end of each day’s
Storage during retention period or until space runs out. At either point, the oldest day’s events
installation, can are deleted. If Event Storage space runs out, the oldest day’s events are deleted
range from 10 GB each day, even if they have yet to reach retention age.
to 8192 GB.*
These events can be in the Default Storage Group or in user-created storage
groups. You can save a copy of these events by archiving the storage group. For
more information, see "Creating an Archive Manually" on page 170 and
"Scheduling an Archive" on page 171).
If the used space reaches the configurable warning and error levels, and you have
configured "Alerts" on page 166, the system issues an email warning that available
space is getting low.
You can view and manage storage groups on the "Storage" on page 156 tab.
* Size is limited by smallest of 8 TB, the license limit, and the disk size.
* CORR-e Database allocates files as needed up to the Allocated Size defined in the
Storage Group. The number of allocated files never decreases; the number only
increases to the maximum indicated. Removing any of these files can cause
corruption of the database.
Online 200 GB Includes daily events that have been archived (copied) from Event Storage. By
Event default, the archives are located under /opt/arcsight/logger/data/archives.
Archives You can specify the directory for each storage group.
You can manage the archives from the "Archive Jobs" on page 166 tab.
There is an audit event when it is too full to archive another day’s events. Audit
events are described in the ArcSight Console User's Guide.
Caution: If you routinely restore archived events back to online storage, make sure
you allocate enough space for those events.
The instructions below describe how to increase the Allocated Size for the entire storage
volume. If you want to change the size of an individual storage group, see "Editing a Storage
Group" on page 162.
Storage Mapping
Use this tab to create a mapping between connectors and storage groups. Doing so enables
you to store events from specific sources to a specific storage group.
You can configure these storage groups with different retention policies, and thus retain event
data based on the source of incoming events. For example, all events from firewall devices can
be subject to a short retention period. To accomplish this, manually assign the firewall devices
to a connector and then create a storage mapping to map the connector to a storage group
with the desired short retention period.
Tip: Events not subject to storage mapping are sent to the Default Storage Group.
4. Select a storage group from the drop-down list. The storage groups must already be set up
before any storage mappings are added.
5. Click Save to add the new storage mapping.
Note: The Connector ID you enter is not validated by the Command Center; be sure to
enter the correct value . The Connector ID must be the Agent ID you derived from the Event
Details.
4. Select a storage group from the drop-down list to associate with the connector you added
manually. The storage groups must already be set up before any storage mappings are
added.
5. Click Save to add the new storage mapping.
Alerts
On the Alerts tab, you can add, edit, or remove email addresses of users to notify when any of
the data storage thresholds are crossed and when any archive processing operation fails.
You can configure the threshold for warning and error notifications in terms of percentage of
used space for both event and system storage.
Archives have a fixed warning threshold that triggers notification when the system attempts to
add an archive for which there is insufficient storage space.
To configure Alerts:
1. Click Administration > Storage and Archive and then open the Alerts tab.
2. Change the following settings as appropriate:
l Warning Threshold — When used space rises above this percentage, the system sends
a notification email. This percentage must be lower than the usage Error Threshold.
l Error Threshold — When usage rises above this percentage, the system sends a
notification email.
l Send Warnings To — The email addresses to send a notification to when the Warning
Threshold is reached. Use a comma-delimited list.
l Send Errors To — The email addresses to send a notification to when the Error
Threshold is reached. Use a comma-delimited list.
3. Click Save at the bottom to save your changes.
Archive Jobs
The Archive Jobs page shows a list of each day’s events for each storage group as an archive
job, and indicates their status. The list displays the archive jobs still in Event Storage as well as
the archives that are only maintained in Archive Storage.
You can filter the list to display only the archive jobs you want to see. For more information
about archives, see "Archives" on the next page.
When you mouse over an Archive Job, a small box appears showing archive details. These
include the date of the events collected in this archive, when the archive was last made
searchable or unsearchable, the event count, and the disk space.
Archives
Archives are directories that contain a copy of one day’s events. When the system creates an
archive copy of a day’s events (and their related indexing information), it creates a
subdirectory containing that day’s events in the archive storage directory that you configured
for each group. The default archive location is under
/opt/arcsight/logger/data/archives/<Storage Group ID>. For example, if the Storage
Group ID was 666 then the root directory would be
/opt/arcsight/logger/data/archives/666/.
The events exist both there in Archive Storage and in Event Storage until their retention date
has passed or until the storage location runs out of space, whichever comes first.
Events that have been archived remain available in event storage until they age out due to the
configured retention policy. Therefore, archived events continue to be searchable until they
age out. Archives that are still in Event Storage have the status “Online”.
When the retention date has passed for a particular day's events, the archive is removed from
Event Storage and is maintained in Archive Storage only, the status of the Archive changes to
“Offline”. Offline archives have been deleted from their storage group and are not included in
search operations. To include such events in search operations, you can make the archives
searchable. When an archive is made searchable, the events in it are included in searches, but
the archive itself remains in the archive storage.
Archiving daily events is optional. You can allow the daily event archives to be deleted at the
end of the retention period or when their storage group runs out of space. If you do not create
the archive, events are deleted at those points and cannot be recovered. Alternatively, you can
archive daily events manually or automatically at a scheduled time for each storage group.
Command Center uses the manager receipt time of an event to determine its archival day. For
example, an event with timestamp of 11:55:00 p.m. on October 19 is received at 12:01:00 a.m.
on October 20 on the system. This event is archived in the archive directory created for
October 20th and not October 19th.
At the scheduled time, one archive directory per storage group is created at the location
specified in the storage group. Each archive directory contains events from 12:00:00 a.m. to
11:59:59 p.m. for a single storage group.
If an archive directory is not created, either because you did not turn archiving on or because
the archive job failed, the daily events are deleted when they reach the retention period
specified for the storage group or when you run out of event storage space, whichever comes
first.
If you need to save older events, consider these three tasks:
l Turn archiving on so that daily events are copied to an archive directory you can back up.
l Regularly back up the Archives Storage directories to another storage device.
l Delete older, offline archives as they are backed up, so that the archive area does not fill
up.
For information on managing Archive storage space, see "Archive Storage Space " on page 172.
For information on managing Storage Group storage space, see "Storage" on page 156.
Available
Status Description Actions
Online This day’s events have been archived, that is, a copy of the events has been stored None.
in the Archive directory. The day’s events are still available in Event Storage
(online). As long as the day’s events remain in event storage, they are available
for search and analysis.
Not The archiving status is Off or the Follow Schedule check box is not checked. Archive:
Scheduled
Events that are not archived will be deleted when they reach the retention period l Archive
age, so make sure to archive any days’ events that you want to keep. Now
If you click Archive Now, the status changes to Archiving (In progress). l Archive on
Schedule
If you click Archive on Schedule, the status changes to Scheduled. (This button is
not enabled unless the archiving status is On and the Follow Schedule check box is
checked.)
Scheduled This day’s events are currently scheduled for automatic daily archival, but have Cancel
not reached the time when they are to be scheduled archived. This includes
today’s events, which are still being collected.
Cancel is available if scheduled archiving is enabled.
If you click Cancel, the status changes to Archiving (Cancelled)but collection of
events continues for that day and at midnight the status changes to Not
Scheduled.
If scheduled archiving is not enabled for the storage group, no action is available.
Available
Status Description Actions
Offline This day’s events have been archived, but the events are only in Archive Storage. Make
These events are not available for analysis. They are preserved until you delete Searchable/
them. Make
Unsearchable.
Click Make Searchable if you need access to the events. When you no longer
need access to the events, click Make Unsearchable.
There are about 193 GB of storage set aside for archives.\
In Progress Any of several actions, including making searchable, making unsearchable, and Cancel
archiving, may be in progress.
If you click Cancel, the status changes as appropriate. For example, if the action in
progress is Archiving, and you click Cancel, the status changes to Archiving
(Cancelled).
Made This archive is offline. The events are in still archive storage, but have made Make
Searchable searchable for analysis. Unsearchable.
l Archived — This set of filters applies to daily event archives that have already had been
copied to an archive directory.
l Online
l Offline
l Made Searchable
l Cancelled — This set of filters displays actions that have the status “Canceled”.
l Archiving (cancelled)
l Make Searchable (cancelled)
l Make Unsearchable (cancelled)
l In Progress — This set of filters displays actions that have the status “In Progress”.
l Archiving (in progress)
l Make Searchable (in progress)
l Make Unsearchable (in progress)
l Failed — This set of filters displays actions that have the status “Failed”.
l Archiving (failed)
l Make Searchable (failed)
l Make Unsearchable (failed)
6. Click Refresh to see the updated list.
To create an archive:
1. Click Administration> Storage and Archive and then open the Archive Jobs tab.
2. Filter the list to find the date and storage group archive you want to add to archive storage
archive.
3. Select the desired archive or archives. The action buttons available for your selection
become active.
4. Click Archive Now to create the archive.
Scheduling an Archive
If you want particular storage group to be archived on a daily basis, you can set it to run at the
scheduled time at any point. This option is only available if archiving is enabled. For
information on how to enable archiving, see "Turning Archiving On and Off" on page 160.
To schedule an archive:
1. Click Administration > Storage and Archive and then open the Archive Jobs tab.
2. Filter the list to find the date and storage group archive you want to archive on schedule.
3. Select the desired archive or archives. The action buttons available for your selection
become active.
4. Click Archive on Schedule to schedule the archive.
Note: If you attempt to make an archive searchable and the combination of the online and
restored archives exceeds the 12TB storage limit, this operation fails. The message ACTIVATE
Action failed: Max storage limit reached appears when you hover the mouse over the
archive line on the Archive Job tab.
To cancel an action:
1. Click Administration> Storage and Archive and then open the Archive Jobs tab.
2. Filter the list to find the archive or archives on which you want to cancel an action.
3. Select the desired archive or archives. The action buttons available for your selection
become active.
4. Click Cancel to cancel the action.
Search Filters
By default, all administrators can view, create, and edit search filters. For other users, access to
this feature is controlled by user permissions. If you need access to this feature, ask your
administrator.
You can create search filters to save specific queries so that you can easily use them again.
Search filters are similar to saved searches. However, filters save the query only, while saved
searches save the time range information in addition to the query. The Search Filters page
provides a convenient place to manage search filters.
To view, add, and edit search filters, a user needs the following permissions:
l View Search Filters:
/All Permissions/ArcSight System/Search Filter Operations/Search Filter Read
l Add or edit Search Filters:
/All Permissions/ArcSight System/Search Filter Operations/Search Filter Write
Note: The Search Filter Write permission requires the Search Filter Read permission. If you
want to give a user write permission, be sure to enable read permission as well.
To load search filters from the Search page, a user needs the following permissions:
l View Saved Searches:
/All Permissions/ArcSight System/Saved Search Operations/Saved Search Read
To save a search filter from the Search page, a user needs this additional
permission:
l Add or Edit Saved Searches:
/All Permissions/ArcSight System/Saved Search Operations/Saved Search Write
For more information on editing access control lists (ACLs), granting or removing permissions
for events, and other permissions-related topics, see the ArcSight Console User's Guide.
4. Click Next.
5. Enter the query for the new filter.
l When you type a query, Search Helper enables you to quickly build a query expression
by automatically providing suggestions, possible matches, and applicable operators.
See "Search Helper" on page 99 for more information.
l Click Advanced Search to use the Search Builder Tool to create the query. For details
about using the Search Builder Tool, see "Using the Advanced Search Tool" on page 95.
6. Click Save.
The filter you created is displayed in the list of search filters.
Saved Searches
A saved search, like a search filter, recalls a specific query. However, in addition to the query, a
saved search saves the time range and the fieldset to display in the search results. Saving the
time range supports scheduled searches that run at a specific interval. For more information,
see "Scheduled Searches" on page 177.
To view, add, and edit saved searches, a user needs the following permissions:
l View Saved Searches:
/All Permissions/ArcSight System/Saved Search Operations/Saved Search Read
l Add or Edit Saved Searches:
/All Permissions/ArcSight System/Saved Search Operations/Saved Search Write
Note: The Saved Search Write permission requires the Saved Search Read permission. If
you want to give a user write permission, be sure to enable read permission as well.
To load saved searches from the Search page, a user needs this additional
permission:
l View Search Filters:
/All Permissions/ArcSight System/Search Filter Operations/Search Filter Read
To save a search from the Search page, a user needs this additional permission:
l Add or edit Search Filters:
/All Permissions/ArcSight System/Search Filter Operations/Search Filter Write
To schedule a saved search from the Search page, a user needs these additional
permissions:
l View Scheduled Searches:
/All Permissions/ArcSight System/Scheduled Search Operations/Scheduled Search Read
l Add or Edit Scheduled Searches:
/All Permissions/ArcSight System/Scheduled Search Operations/Scheduled Search Write
For more information on editing access control lists (ACLs), granting or removing permissions
for events, and other permissions-related topics, see the ArcSight Console User's Guide.
Name A name for this saved search. This name is used for exported output files, with the date and
time appended.
Start Time Absolute date and time of the earliest possible event. Alternatively, check Dynamic to specify
the start time relative to the time when the saved search job is run.
End Time Absolute or dynamic date and time of the latest possible event, as described above.
Parameter Description
Query Enter a query in the text field, or select one or more filters from the Search Filter list.
When you type a query, the Search Helper enables you to quickly build a query expression by
automatically providing suggestions, possible matches, and applicable operators. See "Search
Helper" on page 99 for more information.
Search Select one or more filters from the Search Filter list, or enter a query in the text field. The
Filters search filter(s) you select are used in the search.
Local Search Check this box to limit the saved search to the local system. If the Local Search box is not
checked, the saved search includes all peers.
Scheduled Searches
By default, all administrators can view, create, and edit scheduled searches. For other users,
access to this feature is controlled by user permissions. If you need access to this feature, ask
your administrator.
To view, add, and edit scheduled searches, a user needs the following permissions:
l View Scheduled Searches:
/All Permissions/ArcSight System/Scheduled Search Operations/Scheduled Search Read
l Add or Edit Scheduled Searches:
/All Permissions/ArcSight System/Scheduled Search Operations/Scheduled Search Write
Note: The Scheduled Search Write permission requires the Scheduled Search Read
permission. If you want to give a user write permission, be sure to enable read permission
as well.
For more information about editing access control lists (ACLs), granting or removing
permissions for events, and other permissions-related topics, see the ArcSight Console User's
Guide.
Parameter Description
Schedule Choose Everyday or Days of Week from the first pulldown menu.
If Everyday, select Hour of Day or Every from the second pulldown menu. Enter the hours (1-
23) in the text box.
If Days of Week, enter the days (day 1 is Sunday) in the text box. Then choose Hour of Day or
Every from the second pulldown menu. Enter the hours (1-23) in the second text box.
For example, to perform the search every day at 2 a.m., select Everyday in the first pulldown
menu, then choose Hour of Day from the second pulldown menu and enter 2 in the text box.
To perform the saved search every day at 2 a.m. and 3 p.m., enter 2,15 in the text box.
For another example, to perform the search Tuesdays and Thursdays at 10 p.m., select Days of
Week from the first pulldown menu and enter 3,5 for days. Then choose Hour of Day from the
second pulldown menu and enter 22 in the text box.
Saved Select from the list of saved searches. If none of the saved searches suit your needs, click the
Searches Saved Searches tab (to the left of Scheduled Searches tab) to save a new search. Then come
back to this tab to schedule it.
For more information about defining a saved search query, see "Managing Saved Searches" on
page 176.
You can use Ctrl+Click to select and deselect one or more items from the list.
Note: When multiple saved searches are specified in one scheduled search job, the resulting
file contains the number of hits for each saved search and not the actual events.
Parameter Description
Export For ESM on an appliance, select the directory where the search results will be exported from
Directory the pulldown menu.
Name By default all saved searches are stored in
/opt/arcsight/logger/userdata/logger/user/logger/data/savedsearch. To group your searches in
folders, indicate a subdirectory in which to store them.
If a directory of that name does not exist, it is created.
Title (Optional) Enter a title to appear at top of the PDF file. If no title is specified, the default
“Untitled” is used.
(This field becomes available when you select the PDF output format.)
Fields A list of event fields that will be included in the exported file. By default, all listed fields are
included.
You can enter fields or edit the displayed fields by deselecting All Fields.
Chart Type Type of chart to include in the PDF file. You can select from:
(for PDF Column, Bar, Pie, Area, Line, Stacked Column, Stacked Bar.
only)
Note: This option overrides the Chart Type displayed on the Search Results screen.
(If the search query includes an operator that creates a chart, this field is meaningful;
otherwise, it is ignored.)
Chart Result The maximum number of unique values to include on the chart. The default is 10.
Limit (for (If the search query includes an operator that creates a chart, this field is meaningful;
PDF only) otherwise, it is ignored.)
If the configured Chart Result Limit is less than the number of unique values for a query, the
top values equal to the Chart Result Limit are plotted. That is, if the Chart Result Limit is 5 and 7
unique values are found, the top 5 values will be plotted.
Include Check this box to include an event count with the saved search, or a total when more than one
Summary saved search is specified.
Include only Check this box to include only Common Event Format (CEF) events. Uncheck the box to include
CEF Events all events in the output. Non-CEF events may be found on peers that are Loggers.
Finished Searches
The completion status of searches that were scheduled to run is listed on the Finished Searches
tab. The entries are updated upon page refresh, when you click Refresh, or when you navigate
away from this page and come back to it.
Search
The Search screen enables you to tune advanced search options, view the schema, and end
currently running search tasks.
For general search information, see "Searching for Events in the ArcSight Command Center" on
page 71. For information on how to grant search access, see "Granting Access to Search
Operations and Event Filters" on page 104.
Note: Changing the default search options may affect search performance.
Option Description
Option Description
Populate Default: No
rawEvent field For syslog events only, controls whether raw events are displayed in a column called
for syslog rawEvent, formatted by the Raw Event fieldset.
events
To view the raw events associated with CEF events, you must configure the connector that
sends the events to ESM to populate the rawEvent field.
Note: Even though the rawEvent column displays the raw event, this column is not added
to the database and is not indexed. Therefore, you can only run a keyword (full-text) or
regular expression search on the event.
Managing Fieldsets
By default, all administrators can view, create, edit, and delete custom fieldsets. For other
users, access to this feature is controlled by user permissions. If you need access to this
feature, ask your administrator.
You can view both user-created and predefined fieldsets on the Fieldsets tab. You can delete
the user-created fieldsets from here. For information on how to add a fieldset, see "Fieldsets"
on page 84.
Note: These fieldsets are for use when searching from ArcSight Command Center.
Field sets in ArcSight Console are different.
Note: You can only delete the fieldsets you create, and not the predefined ones available
on your system.
To use a fieldset from the Search page, a user needs the following permissions:
l Search for events:
/All Permissions/ArcSight System/Search Operations/Search
l View Fieldsets:
/All Permissions/ArcSight System/Fieldset Operations/Fieldset Read
To create, edit and delete fieldsets, a user needs this additional permission:
l Add or edit Fieldsets:
/All Permissions/ArcSight System/Fieldset Operations/Fieldset Write
Note: The Fieldset Write permission requires the Fieldset Read permission and the Search
permission. If you want to give a user write permission, be sure to enable those
permissions as well.
For more information on editing access control lists (ACLs), granting or removing permissions
for events, and other permissions-related topics, see the ArcSight Console User's Guide.
Note: The size of each field in the schema is predetermined. If the string you are searching for is
longer than the field length, use a STARTSWITH rather than an = search, and include no more
than the number of characters in the field size. For more information, see "Field-Based Search"
on page 77.
The Default fields tab display includes the database data type for each field. These data types
map to the ArcSight data types as indicated in the following table.
Type on
ArcSight Default Fields
Data type tab Notes
For more information about ArcSight data types, see the ArcSight Console User's Guide.
The Running Tasks tab displays the search tasks that are currently running. If no task is
running, the list will be empty. These tasks include searches initiated by any of the following
operations.
l Manual search (Channels > Event Search)
l Administration > Saved Searches > Scheduled Searches)
l Search export, with the “Rerun query” option checked (Channels > Event Search > Export
Results)
The table shows the session ID, the user who started the tasks, the date and time that the task
started, the number of hits, the number of scanned events, the elapsed time, and the query.
When a task finishes, its entry on the Running Tasks tab is removed. The task entry is removed
upon page refresh, when you click the Refresh button shown above or when you navigate
away from this page and come back to it.
Peers
By default, all administrators can view, create, and edit peers; and run searches on peers. For
other users, access to this feature is controlled by user permissions. If you need access to this
feature, ask your administrator.
An ArcSight Manager can establish peer relationships with one or more Managers or Loggers to
enable distributed searches and Content Management. ArcSight Managers can send content
to, or receive content from, other Managers when they are in a peer relationship. To search
other Managers or Loggers or to use the Content Management feature, you must define one or
more peers.
Note: Both Peering and Content Management are disabled if ESM is running in FIPS Suite B
Mode.
When two systems peer with each other, one initiates the relationship. The initiator sends
credentials to authenticate itself to the target system. If the authentication succeeds, a peer
relationship is established between the two systems. For more information, see
"Authenticating Peers" on page 190.
Configuring Peers
The following steps are required to set up peer relationships.
b. Search
ServerName arcsight:9000
c. Change arcsight to the host's fully qualified domain name and save the file.
d. Restart Apache server by running
/etc/init.d/arcsight_services restart logger_httpd
To Enable Peering
To enable peering to work you must enable port 9000 on the server. Run the following
commands as user root:
firewall-cmd --zone=public --add-port=9000/tcp --permanent
firewall-cmd --reload
Authenticating Peers
Authentication happens only once, at the time the peer relationship is created. The
authorization to use peer services is implicit each time a remote system receives peer requests
from a system that previously authenticated as a peer.
You can authenticate a peer in one of two ways:
l Peer Authorization ID and Code — These credentials are generated on one Manager or
Logger and used on another to configure peering between the two. When generating the
Authorization ID and Code, enter the IP address of the Manager or Logger you will use to
initiate peering in the Peer Authorization page of the one you want to peer with. The IP
address is used to generate a unique ID and code that can be used only for peering from
that address. Therefore, this method is more secure than using a user name and password.
Note: Microfocus recommends using Peer Authorization ID and Code for authentication.
l User name and password — A user name and password already configured on the target
system is used for authentication.
Authenticating a Peer
Use the following procedure to generate the Authorization ID and Code on the target Manager
or Logger with which you want to establish a peer relationship. (Manager A or Logger B in the
example in "Configuring Peers" on page 188.) After that, use the ID and Code on the initiating
Manager or Logger when configuring the peer relationship. (Manager Logger A in that
example.)
Adding a Peer
Adding a peer creates a peer relationship between ArcSight Managers, or between Managers
and Loggers. After a peer is added, you can delete, but not edit it. See "Configuring Peers" on
page 188 for more information.
To add a peer:
1. Click Administration > Peers and then open the Peer Configuration tab.
2. Click Add and enter the following parameters.
Parameter Description
Peer Port For peering with a Manager, use the default port, 9000.
For peering with a Logger, use the configured port.
Peer User Enter a user name already configured on the target system to use for authentication.
Name This user must have the following permissions:
View registered peers:
/All Permissions/ArcSight System/Peer Operations/Peer Read/
Edit, save, and remove registered peers:
/All Permissions/ArcSight System/Peer Operations/Peer Write/
Peer Password Enter the password for the user specified in the Peer User Name field.
Peer Enter the authorization ID generated on the target Manager or Logger. (See "To generate
Authorization the Authorization ID and Code:" on the previous page for more information.)
ID
Peer Enter the authorization code generated on the target Manager or Logger. (See "To generate
Authorization the Authorization ID and Code:" on the previous page for more information.)
Code
External IP In most cases, the value in this field matches the IP address in your browser when you
Address logged into this system (the initiating Manager or Logger), and you do not need to do
anything.
However, if the IP address does not match that address, (for example, when the Manager or
Logger is behind a VPN concentrator), change the value to match the IP address in your
browser.
3. Click Save to add the new peer relationship, or Cancel to quit. The peer relationship is also
added on the peer.
Deleting a Peer
Deleting a peer removes the peer relationship between defined peers. You can perform this
process from either peer.
To delete a peer:
1. Click Administration > Peers and then open the Peer Configuration tab.
2. Locate the peer you want to delete the peer relationship to and click the Delete icon ( )
on that row.
3. Confirm the deletion by clicking OK, or click Cancel to retain the relationship.
The peer relationship is deleted on both peers.
Note: Deleting the peer relationship will only delete this Manager's knowledge of the
relationship if the peer cannot be reached. When the target system is reachable, you can
log into it and delete the peer relationship from there.
To search for peers from the Search page, a user needs these permissions:
l Search for events:
/All Permissions/ArcSight System/Search Operations/Search
l Search for events on remote peers:
/All Permissions/ArcSight System/Peer Operations/Search Remote
Log Retrieval
You must be an administrative user to access this feature.
ESM records some audit and debug information, including details of any issues that occur in
system logs (which differ from event logs). Customer support may ask you to retrieve logs as
part of an incident investigation. If so, follow the steps below and provide the resulting .zip file
to customer support.
When retrieving logs, you have the option to sanitize the log files by obfuscating the IP
addresses, hostnames, and email addresses. However, sanitizing adds extra time to log
retrieval. Each sanitized IP address, hostname, and email address is replaced by the symbols
xxx.xxx.xxx.xxx (for IP addresses), sanitized@email (for emails) and sanitized.host.name (for
hostnames).
All IP addresses, hostnames, and email addresses with the specified suffixes will be
obfuscated. Specifying individual email addresses like [email protected] is not
supported. Individual email addresses and their suffixes will be ignored. If a suffix is not
provided, the retrieval behavior is the same as selecting "Remove IP address".
3. Click Retrieve Logs. The page will display a progress bar while the logs are being retrieved.
4. When the collection is complete, the system log files have been compressed into a single
zip file. A link to this file is displayed on the Log Retrieval page. Click the link to download
the fie.
License
You must be an administrative user to access this feature.
cef (Deprecated)
In most cases, you do not need to explicitly extract event fields using the CEF operator and then
apply other search operators to those fields. You can simply specify the event fields directly.
Note: If you run a peer search on Loggers, one of which is running version 5.1 or earlier (in which
CEF was not deprecated), the query that does not contain CEF defined fields will run without any
issues in the circumstance when the query is initiated on a Logger running version 5.2; however,
if the query is initiated on a version 5.1 Logger, it will fail.
Extracts values for specified fields from matching CEF events. If an event is non-CEF, the field
value is set to NULL.
Usage:
...| cef <field1> <field2> <field3> ...
Notes:
If multiple fields are specified, separate each field name with a white space or a comma.
To identify the name of a CEF field, use the Search Builder tool (click Advanced Search under
the Search text box), which lists the names of all fields alphabetically.
The extracted fields are displayed as additional columns in the All Fields view (of the System
FieldSets). To view only the extracted columns, select User Defined Fieldsets from the System
Fieldsets list.
Example 1:
...| cef categorySignificance agentType
Example 2:
...| cef deviceEventCategory name
chart
Displays search results in a chart form of the specified fields.
Usage:
...| chart <field>
...| chart {{sum | avg | min | max | stdev} (<field>)}+ by <field1>, <field2>,
<field3> ...[span [<time_field>]= <time_bucket>]
where
<field>, <field1>, <field2> are the names of the field that you want to chart. The fields
can be either event fields available in the Command Center schema or a user-defined fields
created using the rex or eval operator prior in the query.
Note: The specified fields must contain numeric values. If a field you specify is of the wrong data
type, you will receive an error message like the following: "The search cannot be run, there is an
error in your query: Invalid field type for field [field name].”
<time> is the bucket size for grouping events. Use d for day, h for hour, m for minute, s for
seconds. For example, 2h, 5d, 1m. (See Notes for details.)
<function> is one of these: count, sum, avg (or mean), min, max, stdev
<new_column_name> is the name you want to assign to the column in which the function’s
results are displayed. For example, Total.
Deprecated Usage:
The following deprecated usage contains “_count”. The recommended usage, as shown above,
is “count”.
Notes:
By default, a column chart is displayed. Other chart types you can select from: bar chart, line
chart, pie chart, area chart, stacked column, or stacked bar.
To change the chart settings (including its type), click the Chart Settings link in the upper right
corner of the Result Chart frame of the screen. You can change these settings:
- Title: Enter a meaningful title for the chart.
- Type: Column, Bar, Pie, Area, Line, Stacked column, Stacked Bar. The last two types create
stacked charts in which multiple values are plotted in a stack form. These charts are an
alternate way of representing multi-series charts, which are described below.
- Display Limit: Number of unique values to plot. Default: 10
If the configured Display Limit is less than the number of unique values for a query, the top
values equal to the specified Display Limit are plotted. That is, if the Display Limit is 5 and 7
unique values are found, the top 5 values will be plotted.
All chart commands except “count by” accept only one field in the input. The specified field
must contain numeric values.
If multiple fields are specified, separate the field names with a white space or a comma.
The chart <field> command does not aggregate field values. It simply lists and charts each
occurrence of the values of the specified field. For example, chart sourcePort. However,
when you use an aggregation function such as count by, sum, avg (or mean), and so on, an
aggregation of the specified fields is performed and charted, as illustrated in "Example 1: " on
page 201.
You can click on a charted value to quickly filter down to events with specific field values. For
more information, see "Chart Drill Down" on page 111.
Aggregation Functions
If an aggregation function such as count, sum, or avg is specified, a chart of the aggregated
results is displayed along with the tabular results of the aggregation operation in a Results
Table. For example, for the aggregation function sum(deviceCustomNumber1), the sum_
deviceCustomNumber1 column in the Results Table displays the sum of unique values of the
deviceCustomNumber1 field. If this field had two unique values 1 and 20, occurring 2 times
each, the sum_deviceCustomNumber1 column displays sum of those two values. For the values:
deviceCustomNumber1 sum_deviceCustomNumber 1
1 2
20 40
When you include multiple functions, one column per function is displayed in the search
Results Table. The Results Chart, however, plots the chart for the field specified in the “by”
clause.
You can use the “as new_column_name” clause to name any column resulting from the
aggregation functions, as shown in this example:
...| chart sum(deviceCustomNumber3) as TotalStorage, avg(deviceCustomNumber3) as
AverageStorage by deviceCustomNumber3
Once defined, the newly defined column can be used in the pipeline as any other field. For
example,
...| chart sum(deviceCustomNumber3) as TotalStorage, avg(deviceCustomNumber3) as
AverageStorage by deviceCustomNumber3 | eval UpdatedStorage = TotalStorage + 100
When you export the search results of a chart operator, the newly defined column name (using
the chart function as new_column_name command) is preserved.
Multi-Series Charts
A multi-series chart can plot the values of multiple aggregation functions in a single chart.
If you include multiple aggregation functions in a chart command, Command Center generates
a multi-series chart that plots the values of the specified aggregation functions along the Y-axis,
as illustrated in "Example 2: " on page 202. Multi-series charts can be any of the chart types
except Pie charts. For example, you can choose to plot a multi-series chart as a stacked chart —
Stacked column or Stacked Bar — in which multiple values are plotted in a stack form, as
illustrated in "Example 3: " on page 202.
If a time field is not specified for the span function, EventTime is used as the default. For
example, the following query uses EventTime by default:
...| chart count by deviceEventCategory span = 5m
By default, the chart command displays the first 10 unique values. If the span function creates
more than 10 unique groups, not all of them will be displayed. If you want to view all of the
unique groups, increase the Display Limit value under Chart Settings. (Click Chart Settings in
the upper right corner of the Result Chart frame of the screen.)
Grouping with span is useful in situations when you want to find out the number of
occurrences in a specific time span.
If you want to find out the total number of incoming bytes every 5 minutes on a device, you
can specify a span of 5m, as shown in this example:
...| chart sum(deviceCustomNumber1) span=5m
The above example assumes that deviceCustomNumber1 field provides the incoming bytes
information for these events.
The span field can be used for grouping in conjunction with or without the event fields that
exist in Command Center schema or user-defined fields using the rex or eval operators. When
a span field is specified in conjunction with an event field, the unique sets of all those fields is
used for grouping. The following example uses deviceCustomNumber3 and deviceAddress in
conjunction with span to find out the number of events (using deviceCustomNumber3) from a
specific source (using deviceAddress) in one hour:
...| chart sum (deviceCustomNumber3) by deviceAddress span=1h
When span is included in a query, search results are grouped by the specified time bucket. For
example, if span=5m, the search results will contain one row for each 5-minute span. If there
are no events within a specific 5-minute span, that row will be empty.
Additionally, the span function assumes a 24-hour day, all year long. If span=1d or 24h, on the
day of daylight savings time change, the event time indicated by the span_eventTime field in
the search results will be different from the previous day by one hour. On the day when there
are 23 hours in a day (in March), the span bucket will still include events from the last 24 hours.
Similarly, on the day when there are 25 hours in the day (in November), the span bucket will
include events from the last 24 hours. The following example illustrates the span_eventTime
field when the span time bucket is 1d and the daylight savings times occurs on
March 9th, 2014 and November 2, 2014:
span_eventTime | avg_logins
3/6/2014 12am | 8
3/7/2014 12am | 10
3/8/2014 12am | 4
3/9/2014 1am | 6
3/15/2014 1am | 7
….
10/31/2011 1am | 4
11/1/2011 1am | 2
11/2/2011 12am | 5
11/3/2011 12am | 7
….
Example 1:
Use the default chart setting (Column Chart) to specify multiple fields. In this example, a count
of unique groups of deviceEventCategory and name fields is displayed and plotted.
... | chart count by deviceEventCategory name
Example 2:
Include average and sum in a chart command, to generate a multi-series chart that plots the
values of these functions along the Y-axis in a single chart.
In the following query, unique groups of deviceEventClassId and deviceEventCategory are
plotted along the X-axis, and the sum of deviceCustomNumber1 and average of
deviceCustomNumber2 is plotted along the Y-axis.
... | chart sum(deviceCustomNumber1), avg(deviceCustomNumber1) by deviceEventClassId
deviceEventCategory
Example 3:
Plot a multi-series chart as a stacked chart — Stacked column or Stacked Bar — in which
multiple values are plotted in a stack form, as shown in the following figure.
...|chart min(baseEventCount) sum(deviceCustomNumber1) AS Qiansum by bytesOut
dedup
Removes duplicate events from search results. That is, events that contain the same value in
the specified field. The first matching event is kept, and the subsequent events with the same
value in the specified field are removed.
Usage:
... | dedup [N] <field1>,<field2>, ... [keepevents=(true|false)] [keepempty=
(true|false)]
N is an optional number that specifies the number of duplicate events to keep. For example,
“dedup 5 deviceEventClassId” will keep the first five events containing the same
deviceEventClassId values for each deviceEventClassId, and remove the events that match after
the first five have been kept. Default: 1.
field1, field2 is a field or a comma-separated field list whose values are compared to
determine duplicate events. If a field list is specified, the values of the unique sets of all those
fields are used to remove events. For example, if name and deviceCustomNumber1 are
specified, and two events contain “Network Usage - Outbound” and “2347896”, only the first
event is kept in the search results.
keepevents specifies whether to set the fields specified in the field list to NULL or not. When
this option is set to True, the values are set to NULL and events are not removed from search
results. However, when this option is set to False, duplicate events are removed from the
search results. Default: False.
keepempty specifies whether to keep events in the search results whose specified fields
contain NULL values. When this option is set to True, events with NULL values are kept,
however if this option is set to False, events with NULL values are removed. Default: False.
Example 1:
To view events from unique devices:
... | dedup deviceAddress
Example 2:
To view unique deviceEventClassId events from unique devices:
... | dedup deviceEventClassId deviceAddress
Example 3:
To view the className in events with Java exceptions in the message field:
exception | <rex_expression> | dedup 5 className
In the above example, rex expression is not shown in detail however this expression extracts
the class name in a field called className, which the dedup operator acts upon.
eval
Displays events that match the resultant of the specified expression. The expression can be a
mathematical, string, or Boolean operation and is evaluated when the query is run. The
resulting value of the expression is assigned to a field name (as specified in the expression).
Once a new field has been defined by the eval operator in a query, this field can be used in the
query for further refining the search results (see Example #3 below, in which a new field “Plus”
is defined by the eval operator; this field is then used by the sort operator.)
Usage:
... | eval <expression>
Notes:
Typically, a cef or rex operator (to extract fields from matching events) precedes the eval
operator, as shown in the examples below. However, you can use the eval operator on a field
that has been defined by a previous eval operator in a query.
Example 1:
If the Category Behavior is “Communicate”, then assign the value “communicate” to a new
field “cat”; otherwise, assign the value “notCommunicate” to it.
_storageGroup IN [“Default Storage Group”] | cef categoryBehavior | eval cat=if
(categoryBehavior== “/Communicate”, “communicate”, “notCommunicate”)
Example 2:
Append the word, “END”, at the end of extracted event name. For example, if event name is
“Command Center Internal Event”, after the eval operation it is “Command Center Internal
EventEND” and is assigned to a new field, “fullname”.
logger | cef msg name | eval fullname=name + “END”
Example 3:
Add 100 to the value of bytesIn and assign it to a new field, “Plus”. Then, sort the values
assigned to “Plus” in ascending order.
_storageGroup IN [“Default Storage Group”] | cef bytesIn bytesOut name | eval
Plus=bytesIn +100 | sort Plus
extract
Extracts key value pairs from raw events.
Usage:
...| extract [pairdelim=“<delimiters>”] [kvdelim=“<delimiters>”] [maxchars=<n>]
fields=“key1,key2,key3...”
pairdelim is a delimiter (or a list of delimiters) that separates one key-value pair from another
key-value pair in an event. By default, semi colon, pipe, and comma (; | ,) are used.
kvdelim is a delimiter (or a list of delimiters) that separates a key from its value. By default,
“=".
maxchars is the maximum number of characters in an event that would be scanned for
extracting key value pairs. By default, 10240.
fields is a key (or a list of comma-separated keys) whose values you want to display in the
search results. For example, if you want to display the Name Age, and Location values from this
event:
Name:Jane | Age:30 | Location:LA
Then, extract the “Name”, “Age”, and “Location” keys and list them in the fields list.
To extract the URL from the above event, you can define these key-pair delimiters, which
separate the key-value pairs in the event:
Greater than sign (“>”)
Square bracket (“[“)
And, define this key delimiter, which separates the key from its value:
Equal to sign (“=")
Thus, the following command will extract the URL
... | extract pairdelim= “>\[” kvdelim= “=" fields=“<a href”
The key value pairs in the event will be: [<a href='function.memcache-pconnect'>
The key in the event will be: <a href
The extracted URL will be: 'function.memcache-pconnect'
Notes:
This operator only works on raw events. That is, you cannot extract key value pairs from
structured data in CEF events or from fields defined by the rex operator. For raw CEF events,
you can use the CEF name as the fieldname.
You can specify the pairdelim and kvdelim delimiters in the extract operator command to
extract keys and their values. However, if you want to determine the key names that these
delimiters will generate, use the keys operator as described in "keys" on page 209. The keys
operator can only be used to determine keys; you cannot pipe those keys in the extract
operator. That is, ...| keys | extract fields=field1 is incorrect.
The keys specified in the fields list can be used further in the pipeline operations. For example,
...| extract pairdelim= “|” kvdelim= “:” fields= “count” | top count
If none of the specified pairdelim characters exist in an event, the event is not parsed into key
value pairs. The whole event is skipped. Similarly, if the specified kvdelim does not exist,
values are not separated from the keys.
To specify double quotes (“) as the delimiter, enter it within the pair of double quotes with
backslash(\) as the escape character. For example, “=\”|”. Similarly, use two backslashes to
treat a backslash character literally. For example, “\\”.
Example:
... | extract pairdelim= “|” kvdelim= “:” fields= “Name,Age,Location”
fields
Includes or excludes specified fields from search results.
Usage:
... | fields ([(+ | -)] <field>)+
+ includes only the specified field or fields in the search results. This is the default.
- excludes only the specified field or fields from the search results.
Notes:
Typically, the <field> list contains event fields available in the Command Center schema or
user-defined fields created using the rex operator prior in the query, as shown in the examples
below. However, fields might also be defined by other operators such as the eval operator.
The + and - can be used in the same expression when multiple fields are specified. For example,
| fields + name - agentType
A complete field name must be specified for this operator; wildcard characters in a field name
are not supported.
When this operator is included in a query, select User Defined Fieldsets from the System
Fieldsets list to view the search results.
Example 1:
... | fields - agentType + categorySignificance
Example 2:
... | fields - name
head
Displays the first <N> lines of the search results.
Usage:
... | head [<N>]
<N> is the number of lines to display. Default: 10, if <N> is not specified.
Notes:
When this operator is included in a query, the search results are not previewable. That is, the
query must finish running before search results are displayed.
Example:
... | head
keys
Identifies keys in raw events based on the specified delimiters.
Usage:
... | keys [pairdelim= “<delimiters>”] [kvdelim= “<delimiters>”] [limit=<n>]
pairdelim is a delimiter (or a list of delimiters) that separates one key-value pair from another
key-value pair in an event. By default, semi colon, pipe, and comma (; | ,) are used.
kvdelim is a delimiter (or a list of delimiters) that separates a key from its value. By default,
“=”.
limit is the maximum number of key value pairs to find. There is no default or maximum
number for this parameter.
Notes:
When searching across peers using the keys operator, the number of events returned when a
search is initiated on a Logger 5.3 SP1 (or earlier version) may not be the same as when the
search is initiated on Logger 6.0 or ArcSight Manager 6.5c (or later versions). This happens
because of the updated schema. Logger 6.0 and ESM 6.5c use the End Time for searches;
Logger 5.3 SP1 and earlier used the Receipt Time.
This operator only works on raw events. That is, you cannot identify key value pairs from CEF
events or fields defined by the rex operator.
Although this operator is not required to determine keys, it is recommended that you use it to
first determine the keys whose values you want to obtain using the extract operator. This
operator returns aggregated results. Therefore, the search results list the keys found in the
matching events and their counts.
The keys operator can only be used to determine keys; you cannot pipe those keys in the
extract operator. That is, | keys | extract fields=field1 is incorrect.
If a key value is blank (or null), it is ignored and not counted toward the number of hits.
For example, for the following event data:
Date=3/24/2014 | Drink=Lemonade
Date=3/23/2014 | Drink=
Date=3/22/2014 | Drink=Coffee
Example 1:
...| keys pairdelim= “|” kvdelim= “=”
Example 2:
...| keys pairdelim= “,” kvdelim= “>=”
rare
Lists the search results in a tabular form of the least common values for the specified field.
That is, the values are listed from the lowest count value to the highest.
When multiple fields are specified, the count of unique sets of all those fields is listed from the
lowest to highest count.
Usage:
...| rare <field1> <field2> <field3> ...
Notes:
Typically, the <field> list contains event fields available in the Command Center schema or
user-defined fields created using the rex or eval operators prior in the query, as shown in the
examples below. However, fields might also be defined by other operators such as the eval
operator.
A chart of the search results is automatically generated when this operator is included in a
query. You can click on a charted value to quickly filter down to events with specific field
values. For more information, see "Chart Drill Down" on page 111.
If multiple fields are specified, separate the field names with a white space or a comma.
Example:
... | rare deviceEventCategory
regex
Selects events that match the specified regular expression.
Usage:
...| regex <regular_expression>
OR
...| regex <field> (=|!=) <regular_expression>
Notes:
Regular expression pattern matching is case insensitive.
The first usage (without a field name) is applied to the raw event. While the second usage (with
a field name), is applied to a specific field.
If you use the second usage (as shown above and in the Example #2 below), either specify an
event field that is available in the Command Center schema or a user-defined field created
using the rex or eval operators.
Example 1:
... | regex “failure”
Example 2:
... | regex deviceEventCategory != “fan”
rename
Renames the specified field name.
Usage:
...| rename <field> as <new_name>
<field> is the name of an event field that is available in the Command Center schema or a user-
defined field created using the rex or eval operator.
<new_name> is the new name you want to assign to the field.
Notes:
An additional column is added to the search results for each renamed field. The field with the
original name continues to be displayed in the search results in addition to the renamed field.
For example, if you rename deviceEventCategory to Category, two columns are displayed in the
search results: deviceEventCategory and Category.
You can include the wildcard character, *, in a field name. However, you must enclose the field
that contains a wildcard character in double quotes (“ ”). For example:
...| rename “*IPAddress” as “*Address”
- or -
...| rename “*IPAddress” as Address
If a field name includes a special character (such as _, a space, #, and so on), it should be
included in double quotes (“ ”) in the rename operator expression. For example:
If the resulting field of a rename operation includes a special character, it must be enclosed in
double quotes (“ ”) whenever you use it in the pipeline operator expression. For example,
...| rename src_ip as “Source IP Address” | top “Source IP Address”
The internal field names (that start with “_raw”) cannot be renamed.
The renamed fields are valid only for the duration of the query.
The resulting field of a rename operation is case sensitive. When using such a field in a search
operation, make sure that you the same case that was used to define the field.
When you export the search results of a search query that contains the rename expression, the
resulting file contains the renamed fields.
Example 1:
...| rename src_ip as IPAddress
Example 2:
...| rename src_ip as “Source IP Address”
replace
Replaces the specified string in the specified fields with the specified new string.
Usage:
<orig_str> with <new_str> [in <field_list>]
<orig_str> is the original string you want to replace. (See Notes for more details.)
<new_str> is the new string you want to replace with. (See Notes for more details.)
<field_list> is the optional, however highly recommended. See Notes for details.
Notes:
Even though the field list is optional for this command, specify the fields on which the replace
operator should act in this command.
If you skip the field list, the replace operator acts on the fields that have been either explicitly
defined using the cef, rex, and eval operators preceding the replace command, or any fields
that were used in other operator commands that preceded the replace operator command.
For example, the replace command acts on deviceEventCategory in all of the following cases
and replaces all instances of “EPS” with “Events”:
...| replace *EPS* with *Events* in deviceEventCategory
...| cef deviceEventCategory | replace *EPS* with *Events*
...| top deviceEventCategory | replace *EPS* with *Events*
An additional column of the same name is added to the search results for each field in which
string is replaced. The column with the original value continues to be displayed in the search
results in addition to the column with replaced values. For example, if you replace “err” with
“Error” in the “message” column, an additional “message” column is added to the search
results that contains the modified value.
If you want to replace the entire string, specify it in full (as it appears in the event). For
example, “192.168.35.3”.
If you want to replace a part of the string, include wildcard character (*) for the part that is not
going to change.
For example, if the original string (the string you want to replace) is “192.168*”, only the
192.168 part in an event is replaced. The remaining string is preserved. As a result, if an event
contains 192.168.35.3, only the first two bytes are replaced. The rest (35.3) will be preserved.
Similarly, if the event contains 192.168.DestIP, DestIP will be preserved. However, if the event
contains the string 192.168, it will not be replaced.
If both, the original and the new strings contain wildcard characters, the number of wildcard
characters in the original string must match the number of wildcard characters in the new
string.
...| replace “*.168.*” with “*.XXX.*
If the original or the new string includes a special character such as / or ?, enclose the string in
double quotes (“ ”):
...| replace “/Monitor” with Error
You can replace multiple values for multiple fields in a single operation by separating each
expression with a comma (,). Note that you must specify the field list after specifying the
“with” expression for all values you want to replace, as shown in the following example:
...| replace "Arc*" with Microfocus, "cpu:100" with EPS in deviceVendor,
deviceEventClassId
The original string is case-insensitive. Therefore, the string “err” will replace an event that
contains “Err”.
Example 1:
Replace any occurrence of “a” with “b” but the characters preceding “a” and succeeding it are
preserved.
...| replace *a* with *b*
Example 2:
Replace any occurrence of “a” with “b” without retaining any characters preceding or
succeeding “a”.
...| replace *a* with b in name
rex
Extracts (or capture) a value based on the specified regular expression or extract and substitute
a value based on the specified “sed” expression. The value can be from a previously specified
field in the query or a raw event message.
Usage:
... | rex <regular_expression containing a field name>
OR
... | rex field = <field> mode=sed “s/<string to be substituted>/<substitution value>”
However, if you wanted to extract the IP address after the word “client” from the following
event and assign it to a field called “SourceIP”, you will need to specify a start and end point for
IP address extraction so that the second IP address in the event is not captured. The starting
point in this event can be “[client” and the end point can be “]”. Thus, the rex expression will
be:
| rex “\[client (?<SourceIP>[^\]]*)”
In this rex expression ?<SourceIP> is the field name defined to capture IP address and “client ”
specifies the text or point in the event AFTER which data will be extracted. The [^\]]*
expression will match every character that is not a closing right bracket, therefore, for our
example event, the expression will match until the end of the first IP address and not the
second IP address that appears after the word “to”.
The “/g” at the end of the command indicates a global replace, that is, all occurrences of the
specified pattern will be replaced in all matching events. If “/g” is omitted, only the first
occurrence of the specified pattern in each event is replaced.
Multiple substitutions can be performed in a single command, as shown in the following
example. In this example, the word “Authentication” is substituted with “xxxx” globally (for all
matching events), the first byte of the agent address that start with “192” is substituted with
“xxxx” and an IP address that starts with “10” is substituted with “xxxx”.
| rex field=msg mode=sed “s/Authentication/xxxx/g” | rex field=agentAddress
mode=sed “s/192/xxxx/g” | rex field=dst mode=sed “s/10.*/xxxx/g”
Notes:
A detailed tutorial on the rex operator is available at "Using the Rex Operator" on page 224.
The extracted values are displayed as additional columns in the All Fields view (of the System
FieldSets). To view only the extracted columns, select User Defined Fieldsets from the System
Fieldsets list. In the above example, an additional column with heading “SourceIP” is added to
the All Fields view; IP address values extracted from events are listed in this column.
If you want to use other search operators such as fields, sort, chart, and so on to refine your
search results, you must first use this operator to extract those fields.
Example 1:
The following example extracts name and social security number from an event that contains
data in name:John ssn:123-45-6789 format and assigns them to Name and SSN fields:
... | rex “name: (?<Name>.*) ssn: (?<SSN>.*)”
Example 2:
The following example extracts URLs from events and displays the top 10 of the extracted
URLs:
... | rex “http://(?<URL>[^ ]*)” | top URL
Example 3:
The following example substitutes the last four digits of social security numbers extracted in
the first event with XXXX:
... | rex field=SSN mode=sed “s/-\d{4}/-XXXX/g”
sort
Sorts search results as specified by the sort criteria.
Usage:
... | sort [<N>] ((+ | -) field)+
+ Sort the results by specified fields in ascending order. This is the default.
- Sort the results by specified fields in descending order.
<N> Keep the top N results, where N can be a number between 1 and 10,000. Default: 10,000.
Notes:
Typically, the <field> list contains event fields available in the Command Center schema or
user-defined fields created using the rex operator prior in the query, as shown in the examples
below. However, fields might also be defined by other operators such as the eval operator.
Sorting is based on the data type of the specified field.
When multiple fields are specified for a sort operation, the first field is used to sort the data. If
there are multiple same values after the first sort, the second field is used to sort within the
same values, followed by third field, and so on. For example, in the example below, first the
matching events are sorted by “cat” (device event category). If multiple events have the same
“cat”, those events are further sorted by “eventId”.
When multiple fields are specified, you can specify a different sort order for each field. For
example, | sort + deviceEventCategory - eventId.
If multiple fields are specified, separate the field names with a white space or a comma.
Sorting is case-sensitive. Therefore, “Error:105” will precede “error:105” in the sorted list
(when sorted in ascending order).
When a sort operator is included in a query, only the top 10,000 matches are displayed. This is
a known limitation and will be addressed in a future Command Center release.
When this operator is included in a query, the search results are not previewable. That is, the
query must finish running before search results are displayed.
Example:
... | sort deviceEventCategory eventId
tail
Displays the last <N> lines of the search results.
Usage:
...| tail [<N>]
<N> is the number of lines to display. Default: 10, if <N> is not specified.
Notes:
When this operator is included in a query, the search results are not previewable. That is, the
query must finish running before search results are displayed.
Example:
... | tail 5
top
Lists the search results in a tabular form of the most common values for the specified field.
That is, the values are listed from the highest count value to the lowest.
Usage:
...| top [<n>] <field1> <field2> <field3> ...
<n> limits the matches to the top n values for the specified fields. Default: 10, if <N> is not
specified.
Notes:
The fields can be either event fields available in the Command Center schema or user-defined
fields created using the rex or eval operators prior in the query. If multiple fields are specified,
separate the field names with a white space or a comma.
When multiple fields are specified, the count of unique sets of all those fields is listed from the
highest to lowest count.
A chart of the search results is automatically generated when this operator is included in a
query. You can click on a charted value to quickly filter down to events with specific field
values. For more information, see "Chart Drill Down" on page 111.
To limit the matches to the top n values for the specified fields, specify a value for n. For
example, ...| top 5 deviceEventCategory
Example 1:
... | top deviceEventCategory
Example 2:
... | top 5 categories
transaction
Groups events that have the same values in the specified fields.
Usage:
... | transaction <field1> <field2>... [maxevents=<number>] [maxspan=<number>
[s|m|h|d]] [maxpause=<number>[s|m|h|d]] [startswith=<reg_exp>] [endswith=<reg_exp>]
field1, field2 is a field or a comma-separated field list whose values are compared to
determine events to group. If a field list is specified, the values of the unique sets of all those
fields are used to determine events to group. For example, if host and portNum are specified,
and two events contain “hostA” and “8080”, the events are grouped in a transaction.
maxevents specifies the maximum number of events that can be part of a single transaction.
For example, if you specify 5, after 5 matching events have been found, additional events are
not included in the transaction. Default: 1000
maxspan specifies the limit on the duration of the transaction. That is, the difference in time
between the first event and all other events in a transaction will never be more than the
specified maxspan limit. For example, if you specify maxspan=30s, the event time of all events
within the transaction will be at most 30 seconds more than the event time of the first event in
the transaction. Default: Unlimited
maxpause specifies the length of time by which consecutive events in a transaction can be
apart. That is, this option ensures that events in a single transaction are never more than the
maxpause value from the previous event in the transaction. Default: Unlimited
startswith specifies a regular expression that is used to recognize the beginning of a
transaction. For example, if a transaction operator includes startswith= “user [L|l]ogin”, all
events are scanned for this regular expression. When an event matches the regular expression,
a transaction is created, and subsequent events with matching fields are added to the
transaction.
Note: The regular expression is applied to the raw event, not to a field in an event.
endswith specifies a regular expression that is used to recognize the end of an existing
transaction. That is, an existing transaction is completed when an event matches the specified
“endswith” regular expression. For example, if a transaction operator includes endswith=
“[L|l]ogout”, any event being added to a transaction is checked, and if the regular expression
matches the event, the transaction is completed.
Notes:
Several of the above options specify “conditions to end” a transaction. Therefore, when
multiple “end conditions” are specified in a transaction operator, the first end condition that
occurs will end the transaction even if the other conditions have not been satisfied yet. For
example, if maxspan is reached but maxevents has not been reached, or if the endswith
regular expression is matched but maxevents has not been reached.
Understanding how the transaction operator works:
A transaction is a set of events that contain the same values in the specified fields. The events
may be further filtered based on the options described above, such as maxspan, maxpause,
and so on. In addition to grouping events, the transaction operator adds these fields to each
event: transactionid, duration, and eventcount. These fields are displayed in the Search Results
as separate columns.
A transactionid is assigned to each transaction when the transaction completes. Transaction
IDs are integers, assigned starting from 1 for the transactions (set of events) found in the
current query. All events in the same transaction will have the same transaction ID.
If an event does not belong to any transaction found in the current query, it is assigned the
transaction ID 0. For example, in a transaction operator with a startswith regular
expression, if the first event in the pipeline does not match the regular expression, that event is
not part of the transaction, and is assigned transaction ID 0.
The duration is the time in milliseconds of the duration of a transaction, which is the difference
between the event time of the last event in the transaction and the first event in the
transaction. The duration field for all events in a transaction is set to the duration value of the
transaction.
The eventcount displays the number of events in a transaction.
Example 1:
To view source addresses accessed within a 5-minute duration:
... | transaction sourceAddress maxspan=5m
Example 2:
To group source addresses by source ports and view 5 events per group:
...| transaction sourceAddress sourcePort maxevents=5
Example 3:
To group users and URLs they accessed within a 10-minute duration:
... | transaction username startswith= “http://” maxspan=10m
Example 4:
To view login transactions from the same session ID and source address in a 1-hour duration:
... | transaction sessionID sourceAddress maxspan=1h startswith= “user [L|l]ogin”
where
Displays events that match the criteria specified in the “where” expression.
Usage:
...| where <expression>
Notes:
<expression> can only be a valid field-based query expression. Arithmetic expressions or
functions are not supported.
Example 1:
... | where eventId is NULL
Example 2:
... | where eventId=10006093313 OR deviceVersion CONTAINS “5.3.1.0.0”
Example 3:
... | where eventId >=10005985569 OR categories= “/Agent/Started”
text1 — The text or point in the event AFTER which information extraction begins. The default
is the beginning of the event.
text2 — The text or point in the event at which information extraction ends.
field1 — The name of the field to which the extracted information is assigned.
regex — The pattern (regular expression) used for matching information to be extracted
between text1 and text2.
Note: If you are an experienced regular expression user, see the Note in the next section for a
quick understanding of how rex enables you to capture named input and reference it for further
processing.
Note: If you are an experienced regular expression user, you can interpret the rex
expression syntax as follows:
rex “(?<field1>regex)”
where the entire expression in the parentheses specifies a named capture. That is, the
captured group is assigned a name, which can be referenced later for further processing.
For example, in the following expression “srcip” is the name assigned to the capture.
failed | rex “(?<srcip>[^ ]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})”
Therefore, “[client” is the starting point. A good end point is the “]” after the last byte of the
client IP address. Now, we need to define the regular expression that will extract the IP
address. Because in this example, only the client IP address appears after the word “client”, we
use “*” as the regular expression, which means “extract everything”. (We could be more
specific and use \d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} for the IP address.) We assign the
extracted IP address to a field name “clientIP”. We are almost ready to create a rex expression,
except that we need to escape the “[” and “]” characters in the expression. The escape
character to use is “\”.
Now, we are ready to create the rex expression to extract the IP address that appears after the
word “client” in the event shown above.
| rex “\[client(?<clientip>[^\]]*)”
Related Topic:
"Creating an Event Channel" on page 53
console.channel.newChannel.defaultSubtractTime="$Now - 2h"
... to change the start time to two hours ago. For a list of possible time values see the Start
Time: field pull-down menu.
If setting the End Time results in the message “Invalid end date for sliding channel,” the
channel is set to Continuously evaluate instead of Evaluate once at attach time. Either
re-set the End Time or change the Time Parameters option for the channel to Continuously
evaluate.
Avoid creating an active channel that queries more than once per day. For active channels that
query more than once per day, use Evaluate time parameters once at attach time
instead of Continuously evaluate. Better yet, use trends for these types of active channels.
Related Topic:
"Creating an Event Channel" on page 53
Related Topic:
"Viewing Events On an Active Channel" on page 38
Related Topic:
"Viewing Events On an Active Channel" on page 38
Related Topic:
"Viewing Events On an Active Channel" on page 38
Related Topic:
"Evaluate the Network Route of a Event in a Channel" on page 42
Related Topic:
"Viewing Events On an Active Channel" on page 38
Does Command Center support non-ASCII payload data? Page 229 of 231
User's Guide
Appendix C: Frequently Asked Questions
Related Topic:
"Viewing Events On an Active Channel" on page 38
Why does the right end of the top menu bar appear overlapped? Page 230 of 231
Send Documentation Feedback
If you have comments about this document, you can contact the documentation team by
email. If an email client is configured on this computer, click the link above and an email
window opens with the following information in the subject line:
Feedback on User's Guide (Command Center 7.6)
Just add your feedback to the email and click send.
If no email client is available, copy the information above to a new message in a web mail
client, and send your feedback to [email protected].
We appreciate your feedback!