Akamai Event Viewer¶

About¶
Akamai Event Viewer is part of Akamai's suite of content delivery network (CDN) and cloud services. Specifically, it is used for monitoring and analyzing real-time streaming events. This tool provides insights into the performance and delivery of live or on-demand video streams, helping users to understand how their content is being consumed and to troubleshoot any issues that might arise during the streaming process.
Product Details¶
Vendor URL: Akamai
Product Type: Cloud Service
Product Tier: Tier III
Integration Method: API
Parser Details¶
Log Format: JSON
Expected Normalization Rate: 100%
Data Label: AKAMAI_EVT_VWR
UDM Fields (list of all UDM fields leveraged in the Parser):
| Log File Field | UDM Field |
|---|---|
| ACCOUNT_NAME | principal.user.company_name |
| ACCOUNT_STATUS | additional.fields |
| AccountID | principal.user.userid |
| action | security_result.action_details |
| Alert Condition (% Errors) | security_result.detection_fields |
| Alert definition id | security_result.detection_fields |
| Alert editor | principal.user.user_display_name |
| Alert id | security_result.rule_id |
| Alert name | security_result.rule_name |
| Alert Threshold | security_result.detection_fields |
| APPLICATION | target.application |
| ASSET_ID | target.resource.id |
| Auth Grants | target.user.attribute.permissions |
| authenticationMethod | extensions.auth.auth_details |
| authorized_users | additional.fields |
| base_url | target.url |
| Change ID | additional.fields |
| Client IP | principal.ip |
| client_description | security_result.summary |
| client_name | principal.user.userid |
| client_type | principal.user.role_name |
| Company Name | principal.user.company_name |
| configID | additional.fields |
| configVersion | additional.fields |
| CONTRACT_TYPE_ID | target.resource.attribute.labels |
| contractId | target.resource.attribute.labels |
| country_code | principal.location.country_or_region |
| CP Code | additional.fields |
| details | security_result.summary |
| Domain | target.asset.network_domain |
| domain | intermediary.asset.network_domain |
| Edge IP | intermediary.ip |
| target.user.email_addresses | |
| Email To | target.hostname |
| Email To | network.email.to |
| Email_Address | target.user.userid |
| entityId | intermediary.asset.asset_id |
| Errors | security_result.detection_fields |
| event_code | security_result.rule_name |
| eventDescription | metadata.description |
| eventId | metadata.product_log_id |
| eventName | security_result.description |
| eventTypeName | metadata.product_event_type |
| Filename | target.file.names |
| First_Name | target.user.first_name |
| From | network.email.from |
| Ghost IP | target.ip |
| Hits | security_result.detection_fields |
| Hostname | target.hostname |
| IS_INTERNAL_USER | additional.fields |
| IS_ON_HOME_ACCOUNT | additional.fields |
| Last_Name | target.user.last_name |
| message | security_result.summary |
| Metadata Type | target.resource.resource_subtype |
| method | additional.fields |
| Name | security_result.rule_name |
| netlist-id | target.resource.id |
| netlist-type | target.resource.resource_subtype |
| netlist-user | principal.user.userid |
| notBefore | network.tls.client.certificate.not_before |
| notOnOrAfter | network.tls.client.certificate.not_after |
| Operation | security_result.action_details |
| os | principal.platform |
| Phone | target.user.phone_numbers |
| Policy name | target.resource.name |
| Policy Set name | security_result.rule_name |
| Policy set type | target.resource.resource_subtype |
| policyID | security_result.rule_id |
| PortalUserName | principal.user.user_display_name |
| PROPERTY_NAME | target.resource.name |
| PROPERTY_VERSION | target.resource.attribute.labels |
| protections | target.resource.attribute.labels |
| pulsar_host | intermediary.hostname |
| pulsar_host | intermediary.ip |
| Purge action | security_result.action_details |
| Purge request | additional.fields |
| receivedUserId | target.user.userid |
| Request Path | target.url |
| requestId | network.session_id |
| Response Status Code | network.http.response_code |
| Service | target.application |
| serviceName | target.application |
| Subject | network.email.subject |
| Template id | security_result.detection_fields |
| Ticket Number | additional.fields |
| to | network.email.to |
| true_client_ip | principal.ip |
| Type | security_result.rule_type |
| username | principal.user.userid |
| username | principal.hostname |
| USERNAME | principal.user.userid |
Product Event Types¶
| Event | UDM Event Classification |
|---|---|
| Activate configuration on production | USER_RESOURCE_CREATION |
| Activate configuration on staging | USER_RESOURCE_CREATION |
| Add new user | USER_CREATION |
| Copy new version | USER_RESOURCE_CREATION |
| Customer Notification Sent | EMAIL_TRANSACTION |
| Else | STATUS_UPDATE |
| FileManager 2.0 User Action | FILE_UNCATEGORIZED |
| login | USER_LOGIN |
| logout | USER_LOGOUT |
| Send activation email | USER_COMMUNICATION |
| Submit ARL File | FILE_UNCATEGORIZED |
| Update firewall protection | SETTING_MODIFICATION |
Log Sample¶
{"eventData":[{"key":"userIdAttributeName","value":"Email"},{"key":"method","value":"sp_init"},{"key":"authenticationMethod","value":"federate.example.com:saml2"},{"key":"requestId","value":"_123a1b3c-1234-1234-a123-123abc123abc"},{"key":"domain","value":"control.akamai.com"},{"key":"notOnOrAfter","value":"2024-09-04T19:50:04.878Z"},{"key":"entityId","value":"federate.example.com:saml2"},{"key":"details","value":"User jane.doe@example.com has been successfully logged in using federate.example.com:saml2 IDP"},{"key":"notBefore","value":"2024-09-04T19:40:04.878Z"},{"key":"pulsar_host","value":"10.168.118.46"},{"key":"arrivalDate","value":"2024-09-04T19:45:05.255529798Z"}],"eventId":"8fb9d470-a084-4529-a620-dafeb03cd09a","eventTime":"2024-09-04T19:45:05.439Z","eventType":{"eventDefinition":{"eventDefinitionId":"1048087","eventDescription":"A user successfully authenticated using Single Sign-on (SSO)","eventName":"Successful SSO Login"},"eventTypeId":"16","eventTypeName":"All Logins"},"impersonator":false,"username":"jane.doe@example.com"}
Sample Parsing¶
additional.fields["Method"] = "sp_init"
extensions.auth.auth_details = "federate.example.com:saml2"
extensions.auth.type = "SSO"
intermediary.asset.asset_id = "entityId: federate.example.com:saml2"
intermediary.asset.network_domain = "control.akamai.com"
intermediary.ip = "10.168.118.46"
metadata.description = "A user successfully authenticated using Single Sign-on (SSO)"
metadata.event_type = "USER_LOGIN"
metadata.log_type = "AKAMAI_EVT_VWR"
metadata.product_deployment_id = "16"
metadata.product_event_type = "All Logins"
metadata.product_log_id = "8fb9d470-a084-4529-a620-dafeb03cd09a"
metadata.product_name = "Event Viewer"
metadata.vendor_name = "Akamai"
network.session_id = "_123a1b3c-1234-1234-a123-123abc123abc"
network.tls.client.certificate.not_after.seconds = 1725479404
network.tls.client.certificate.not_after.nanos = 878000000
network.tls.client.certificate.not_before.seconds = 1725478804
network.tls.client.certificate.not_before.nanos = 878000000
principal.hostname = "jane.doe"
principal.user.userid = "jane.doe@example.com"
security_result.action = "ALLOW"
security_result.description = "Successful SSO Login"
security_result.summary = "User jane.doe@example.com has been successfully logged in using federate.example.com:saml2 IDP"
target.user.email_addresses = "jane.doe@example.com"
target.user.userid = "jane.doe@example.com"