Experience Center
NSS Feed Output Format: DNS Logs
The DNS Nanolog Streaming Service (NSS) feed specifies the data from the DNS logs that the NSS sends to the security information and event management (SIEM) system. You can configure an NSS feed by including one or more fields. The fields and their values display in the NSS feed output.
- View a sample DNS log.
"Mon Jun 20 14:56:51 2022","gurmeet@gsk.com","Service Admin","Road Warrior","Allow","Allow","DNS_1","Zscaler Bypass Traffic","AAAA","wpad.test.com","EMPTY_RESP","53","0","10.66.16.9","10.66.69.21","Corporate Marketing","Other","Zscaler","DESKTOP-J1E9T1L"
Close
The following tables display information about the DNS fields and possible values for those fields.
Fields that support obfuscation are documented in the following tables with the prefix o
(e.g., %s{odomcat}
). To obfuscate a field, manually add the prefix o
before the field name in the Feed Output Format in the Admin Portal.
Date/Time
Field | Description | Example |
---|---|---|
%s{time} | The time and date of the transaction. This excludes the time zone. | Mon Oct 16 22:55:48 2023 |
%s{tz} | The time zone. This is the same as the time zone you specified when you configured the NSS feed. | GMT |
%02d{ss} | Seconds (0–59) | 48 |
%02d{mm} | Minutes (0–59) | 55 |
%02d{hh} | Hours (0–23) | 22 |
%02d{dd} | The day of the month (1–31) | 16 |
%02d{mth} | The month of the year | 10 |
%04d{yyyy} | Year | 2023 |
%s{mon} | The name of the month | Oct |
%s{day} | The day of the week | Mon |
%d{epochtime} | The epoch time of the transaction | 1578128400 |
Transaction Action
Field | Description | Example |
---|---|---|
%s{reqrulelabel} | The name of the rule that was applied to the DNS request | |
%s{reqaction} | The name of the action that was applied to the DNS request | REQ_ALLOW RES_BLOC |
%s{resrulelabel} | The name of the rule that was applied to the DNS response | |
%s{resaction} | The name of the action that was applied to the DNS response | |
%s{ecs_slot} | The name of the EDNS Client Subnet (ECS) rule that was applied to the DNS transaction | ECS Slot #17 |
%s{dnsgw_slot} | The name of the DNS Gateway rule | DNS GATEWAY Rule 1 |
Transaction Information
Field | Description | Example |
---|---|---|
%d{istcp} | Indicates if the DNS transaction uses TCP |
|
%s{cip} | The IP address of the user. This can be the internal IP address if it is visible (e.g., traffic sent through a GRE tunnel or an internal IP address indicated using XFF). Otherwise, it's the client's internet (NATed Public) IP address. | 203.0.113.5, 2a02:2e0:40c:102:1:2b:10:80, 2001:db8::2:1 |
%d{ocip} | The obfuscated version of the client source IP address. This field displays a random string. | 9960223283 |
%d{durationms} | The duration of the DNS request in milliseconds | |
%s{sip} | The server IP address of the request | 192.168.2.200, 2a02:2e0:40c:102:1:2b:10:80, 2001:db8::2:1 |
%d{recordid} | The unique record identifier for each log | |
%s{pcapid} | The path of the packet capture (PCAP) file that captured the transaction. The PCAP ID has the following format: <Company ID>/<Directory>/<PCAP File Name> . The company ID is the internal ID of an organization and can be found on the Company Profile page. The directory is the log type. To download the PCAP file, go to the Capture column on the DNS Insights Logs page. | 43139974/dns/663ba8fd30b50001.pcap |
%s{location} | The gateway location or sub-location of the source | Headquarters |
%s{req} | The Fully Qualified Domain Name (FQDN) in the DNS request | mail.safemarch.com |
%s{res} | The resolved IP or NAME in the DNS response | 192.168.2.200, 2a02:2e0:40c:102:1:2b:10:80, 2001:db8::2:1, EMPTY_RESP |
%s{domcat} | The URL Category of the FQDN in the DNS request | Professional Services |
%s{odomcat} | The obfuscated version of the FQDN in the DNS request | 4951704103 |
%s{respipcat} | The URL Category of the FQDN in the DNS response | Adult Themes |
%s{reqtype} | The DNS request type | A record |
%s{restype} | The DNS response type. The means or format of the response. | IPv4, IPv6 |
%d{sport} | The server port of the request | |
%s{eedone} | Indicates if the characters specified in the Feed Escape Character field of the NSS configuration page were hex encoded | |
%s{error} | The DNS error code. Usually an incomplete or failed transaction. | EMPTY_RESP |
%s{ecs_prefix} | The EDNS Client Subnet (ECS) prefix used in the DNS request. This field displays a numeric string. | 192.168.0.0 |
%s{dnsgw_srv_proto} | The DNS Gateway server protocol | TCP, UDP, HTTP |
%s{dnsgw_flags} | Flags indicating the DNS Gateway status for the transaction |
|
%s{http_code} | The HTTP return code | 100 - Continue |
%s{dnsappcat} | The DNS tunnel or network application category |
|
%s{dnsapp} | The type of DNS tunnel or network application |
|
%s{protocol} | The protocol type |
|
User Information
Field | Description | Example |
---|---|---|
%s{login} | The login name in email address format | jdoe@safemarch.com |
%s{dept} | The department | Sales |
%s{company} | The company name | Zscaler |
%s{cloudname} | The Zscaler cloud name | zscaler.net |
Zscaler Client Connector Device Information
Field | Description | Example |
---|---|---|
%s{devicehostname} | The hostname of the device | THINKPADSMITH |
%s{odevicehostname} | The obfuscated version of the hostname of the device. This field displays a random string. | 2168890624 |
%s{devicename} | The name of the device | admin |
%s{odevicename} | The obfuscated version of the name of the device. This field displays a random string. | 2175092224 |
%s{deviceowner} | The owner of the device | jsmith |
%s{odeviceowner} | The obfuscated version of the owner of the device.This field displays a random string. | 10831489 |
%s{devicemodel} | The model of the device | VMware7,1 |
%s{deviceosversion} | The OS version that the device uses | Microsoft Windows 10 Enterprise;64 bit |
%s{deviceostype} | The OS type of the device | Windows OS |
%s{deviceappversion} | The app version that the device uses | 4.3.0.18 |
%s{devicetype} | The type of device | Zscaler Client Connector |
Data Center
Field | Description | Example |
---|---|---|
%s{datacenter} | The name of the data center | CA Client Node DC |
%s{datacentercity} | The city where the data center is located | Sa |
%s{datacentercountry} | The country where the data center is located | US |
Hex-Encoded Fields
The Zscaler service hex encodes all non-printable ASCII characters that are in URLs when it sends logs to the NSS. Any URL character that is less than or equal to 0x20, or greater than or equal to 0x7F, is encoded as %HH
. This ensures that your SIEM can parse the URLs that contain control characters. For example, a \n
character in a URL is encoded as %0A
, and a space is encoded as %20
.
The following fields have been added as hex-encoded fields:
- elocation
- edepartment
- erulelabel
- ethreatname
- elogin
- edevicehostname