Skip to content

Aruba Networking Central

Aruba Networking Central

About

A cloud-based networking solution that empowers IT with AI-powered insights, intuitive visualizations, workflow automation, and edge-to-cloud security to manage campus, branch, remote, data center, and IoT networks from one dashboard.

Product Details

Vendor URL: Aruba Networking Central

Product Type: Networking

Product Tier: Tier III

Integration Method: Generic Webhook

Integration URL: Aruba Central - Integration Guide

Log Guide: Sample Logs by Log Type

Parser Details

Log Format: JSON

Expected Normalization Rate: 100%

Data Label: ARUBA_CENTRAL

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
alert_type metadata.product_event_type
cid observer.asset.labels
cluster_hostname observer.hostname
description security_result.description
details.__base_url target.url
details._rule_number security_result.rule_id
details.config_change security_result.summary
details.dev_type target.asset.hardware.model
details.group target.group.product_object_id
details.group_name target.group.group_display_name
details.macaddr target.mac
details.rules.0 security_result.rule_labels
details.serial target.asset.hardware.serial_number
details.user principal.hostname
id metadata.product_log_id
operation security_result.action_details
parameters target.ip
parameters target.mac
state security_result.outcomes
text target.hostname
webhook additional.fields

Product Event Types

Event UDM Event Classification
generic GENERIC_EVENT
DEVICE_CONFIG_CHANGE_DETECTED GROUP_MODIFICATION

Log Sample

{"alert_type":"Rogue AP detected","cid":"123456789123456789","cluster_hostname":"app-uswest4.central.arubanetworks.com","description":"An AP(NAME HOSTNAME-002-ABC) detected an access point (BSSID A0:A1:A3:00:00:00) as rogue","details":{"__base_url":"https://app-uswest4.central.arubanetworks.com","description":"An AP(NAME HOSTNAME-002-ABC) detected an access point (BSSID A0:A1:A3:00:00:00) as rogue","device_id":"ABC1234","group":"123","labels":"8","rules":["{'conditions': [{'severity': 4}], 'group': [233, 234, 0, 15, 257, 2, 240, 238, 239, 246, 237, 251, 241, 242, 243, 244, 245, 248, 247, 256, 123, 236, 235, 252, 253], 'label': [1, 5, 118, 17, 9, 3, 2, 4, 83, 85, 10, 6, 50, 11, 84, 12, 8], 'rule_number': 0}"],"serial":"ABC1234","setting_id":"123456789123456789-10","time":"2024-05-07 05:55:33 UTC","ts":"1715061333"},"device_id":"ABC1234","id":"abc123def","nid":10,"operation":"create","setting_id":"123456789123456789-10","severity":"Major","state":"Open","text":"An AP(NAME HOSTNAME-002-ABC) detected an access point (BSSID A0:A1:A3:00:00:00) as rogue","timestamp":1715061333,"webhook":"a1b03c4d5e-1234-1abc-abc4-1234567"}

Sample Parsing

additional.fields["webhook"] = "a1b03c4d5e-1234-1abc-abc4-1234567"
metadata.description = "Rogue AP detected"
metadata.product_name = "Central"
metadata.vendor_name = "ArubaNetworks"
observer.asset.labels.key = "CID"
observer.asset.labels.value = "123456789123456789"
observer.hostname = "app-uswest4.central.arubanetworks.com"
principal.hostname = "HOSTNAME-002-ABC"
security_result.action_details = "create"
security_result.description = "An AP(NAME HOSTNAME-002-ABC) detected an access point (BSSID A0:A1:A3:00:00:00) as rogue"
security_result.outcomes.key = "State"
security_result.outcomes.value = "Open"
security_result.rule_labels.key = "rules"
security_result.rule_labels.value = "{'conditions': [{'severity': 4}], 'group': [233, 234, 0, 15, 257, 2, 240, 238, 239, 246, 237, 251, 241, 242, 243, 244, 245, 248, 247, 256, 123, 236, 235, 252, 253], 'label': [1, 5, 118, 17, 9, 3, 2, 4, 83, 85, 10, 6, 50, 11, 84, 12, 8], 'rule_number': 0}"
security_result.severity_details = "Major"
target.asset.hardware.serial_number = "ABC1234"
target.group.product_object_id = "123"
target.mac = "A0:A1:A3:00:00:00"
target.url = "https://app-uswest4.central.arubanetworks.com"