Skip to content

Event Kinds Reference

Event kinds are the normalized identifiers Telovix uses across alerts, the Console UI, APIs, SIEM forwarding, webhooks, and detection rules. They are stable strings that appear consistently whether you are reading an alert, filtering the Events view, writing a custom detection rule, or configuring a SIEM destination.


How to read this reference

Each event kind entry includes:

  • Source: what eBPF hook or mechanism generates it
  • Default severity: the severity used when no rule overrides it
  • Description: what the event means operationally

Severities: info, warning, high, critical.


Process and lifecycle events

Event kindSource hookDefault severityDescription
process_execsys_execve / kprobeinfoA process executed via execve. Includes binary path, PID, UID, parent, and ancestor chain.
process_exitsys_exit_group / kprobeinfoA process exited with its exit code.
process_forksys_fork / kprobeinfoA process forked via clone syscall.
process_exec_burstAggregationwarning5 or more process_exec events from the same parent binary within 1 second are collapsed into a single burst record with a count.
process_fork_burstAggregationwarning3 or more process_fork events from the same parent binary within 1 second are collapsed into a single burst record.

Burst aggregation: The burst thresholds exist to reduce noise from legitimate process storms (package managers, build systems, init sequences) and prevent heartbeat overload. Burst records include the count and a representative summary; individual events within the burst are not separately stored.


File and integrity events

Event kindSource hookDefault severityDescription
file_openopenat / kprobeinfoA process opened a sensitive system file (credentials, SSH keys, PAM configuration). Only fires for paths in the FIM watch list.
file_writesys_write + VFS_WRITE / kprobecriticalA process wrote to a sensitive system file. Covers credential modification, binary replacement, and persistence mechanisms.
file_mmapsys_mmap_pgoff / kprobewarningA process memory-mapped an executable file. Indicates potential code injection.
file_unlinksys_unlink / kprobewarningA file was deleted. Relevant for log tampering detection.
fim_alertBaseline hash mismatchcriticalA file integrity violation fired. A binary or system configuration file was modified since the enrolled baseline hash.

Network and flow events

Event kindSource hookDefault severityDescription
network_connecttcp_connect / kprobeinfoAn outbound TCP or UDP connection was initiated. Includes binary, destination IP and port, PID, and UID.
network_acceptinet_csk_accept / kprobeinfoA server-side TCP accept completed. Identifies inbound connections with process attribution.
network_listeninet_listen / kprobewarningA process opened a listening TCP socket. Warning severity because unexpected listeners indicate potential backdoor ports.
network_flowtcp_connect + tcp_close / aggregationinfoA completed TCP flow record with final state, duration, and bytes sent. Generated when the connection closes.
tcp_closetcp_close / kprobeinfoA TCP connection closed. Used internally for flow tracking; may appear in raw event queries.
socket_createinet_create / kprobeinfoA socket was created (TCP, UDP, AF_UNIX).
socket_bindinet_bind / kprobeinfoA socket was bound to an address and port.
socket_listeninet_listen / kprobewarningA socket was placed in LISTEN state. Potential C2 server indicator.
socket_connectinet_stream_connect / kprobeinfoA socket connected to a remote peer.

DNS events

Event kindSource hookDefault severityDescription
dns_queryudp_sendmsg + port 53/853/5353 / kprobeinfoA DNS query was sent. Covers UDP port 53, DoT port 853, and mDNS port 5353. Queries to non-standard resolvers are flagged as C2 indicators.
dns_lookupgetaddrinfo / uprobeinfoA userspace hostname lookup via getaddrinfo() occurred before a network connection.
dns_resolutionCorrelationinfoA correlated hostname-to-IP mapping resolved from getaddrinfo() plus network_connect timing.

Security and identity events

Event kindSource hookDefault severityDescription
privilege_changesys_setuid / kprobewarningsetuid or setgid was called. Identity change detected.
namespace_createsys_clone + CLONE_NEW* / kprobewarningA process created a Linux namespace. Normal for container runtimes; CLONE_NEWUSER indicates UID 0 inside the namespace, which warrants investigation outside container contexts.
ptracesys_ptrace / kprobewarningA process attached to another with ptrace. Anti-forensics risk.
cap_changecap_capable / LSMwarningA capability check result changed. Indicates capability bypass attempts.
signalsys_kill / kprobewarningA signal was sent to another process. Relevant for lateral movement patterns.
capability_auditcap audit / LSMwarningUnexpected capability usage observed.

LSM hook events

Event kindSource hookDefault severityDescription
lsm_execLSM security hookinfoAn LSM-backed execution security hook fired.
lsm_net_connectLSM security hookinfoAn LSM-backed network security hook fired.
lsm_file_openLSM security hookinfoAn LSM-backed file open observation fired.
lsm_setuidLSM security hookwarningAn LSM-backed identity change or privileged execution event fired.
lsm_mountLSM security hookwarningA mount-related LSM hook fired.
lsm_kernel_readLSM security hookwarningA kernel or privileged file read hook fired.

Kernel and eBPF integrity events

Event kindSource hookDefault severityDescription
module_loadsys_init_module / kprobehighA kernel module was loaded. Rootkit indicator when unexpected.
bpf_object_getsys_bpf + BPF_OBJ_GET_INFO_BY_FD / kprobecriticalAccess to a BPF map was observed. Potential tampering with the sensor monitoring itself.
bpf_map_updatesys_bpf + BPF_MAP_UPDATE_ELEM / kprobecriticalAn eBPF map was modified. Indicates potential sensor disablement or evasion.
bpf_tamperingBPF program or map accesscriticaleBPF program or map tampered. Sensor disablement risk.

Application-layer events

These events are generated from protocol parsing at the application layer, not from kernel hooks.

Event kindSourceDefault severityDescription
api_sessionHTTP/2 or gRPC frame captureinfoAn application-layer session observed for HTTP/2, gRPC, or 5G SBI NF-to-NF communication.
api_callgRPC method decoding or HTTP path extractioninfoAn application-layer API call observed in HTTP/2 or 5G SBI traffic.

Alert system and detection events

These event kinds are generated by the Console alert system, behavioral analytics, or custom rules rather than directly by eBPF hooks.

Event kindCategoryDefault severityDescription
security_violationSecuritycriticalGeneric security policy violation from a pack or LSM rule.
anomalous_behaviorBehavioralwarningBehavior deviates from the established baseline for this process.
custom_detectionCustomwarningMatched a user-defined custom detection rule.
enforcement_actionEnforcementinfoA policy enforcement action was taken: process killed or packet dropped.
guardian_profile_violationGuardianwarningA Guardian Profile detected behavior outside the approved behavioral envelope.

O-RAN WG11 and telecom protocol events

These events are generated by the telecom flavor sensor from protocol parsing and O-RAN monitoring modules.

Signaling protocol events

Event kindDefault severityDescription
ngap_procedureinfoAn NGAP control-plane procedure or KPI event was observed on the N2 interface.
pfcp_sessioninfoA PFCP session or control event was observed on the N4 interface.
gtpu_tunnelinfoA GTP-U tunnel lifecycle event was observed.
sbi_requestinfoAn SBI request between 5G Core network functions was observed.
sbi_responseinfoAn SBI response between 5G Core network functions was observed.
diameter_messageinfoA Diameter protocol message was observed.
radius_messageinfoA RADIUS authentication or accounting message was observed.
m3ua_transport_upinfoAn M3UA or SIGTRAN transport association came up.
oran_e2_peerinfoAn O-RAN E2 peer relationship was observed.

O1 management plane events (WG11: ORAN_O1)

Event kindDefault severityDescription
k2_o1_new_peerhighA new management peer appeared on the O1 plane after the learning window.
k2_o1_public_management_peercriticalAn O1 management peer connected from a public internet IP address.
k2_o1_peer_changedhighA previously known O1 peer address changed.
k2_o1_callhome_unexpectedhighUnexpected NETCONF call-home behavior was observed.
k2_o1_wrong_processhighA non-management process attempted to use the O1 management path.

O2 infrastructure events (WG11: ORAN_O2)

Event kindDefault severityDescription
k3_o2_public_peercriticalAn O2 infrastructure management peer connected from a public internet IP.
k3_o2_new_callerhighA new or unclassified caller used the O2 REST interface.
k3_o2_destructive_operationcriticalA destructive infrastructure operation was attempted by an unauthorized process.

E2 interface and RIC events (WG11: ORAN_E2, ORAN_XAPP)

Event kindDefault severityDescription
oran_e2_public_peercriticalAn E2 peer connected from a public internet IP address.
oran_e2_peer_changehighA previously known E2 peer address changed.
oran_e2_multi_richighMore than one RIC peer was observed for a single xApp or E2 agent.
oran_e2_wrong_processhighA non-RAN process used the E2 interface.
oran_e2_unclassified_agentwarningAn unclassified binary accessed the E2 interface.
oran_e2_port_anomalyhighE2-like signaling appeared on a non-standard port.
oran_api_a1_policyhighA1 policy operations were attempted from an unauthorized caller.
oran_api_route_modificationhighNear-RT RIC route manipulation was attempted by an unexpected process.
oran_api_e2t_accesshighUnexpected access to E2 termination surfaces was observed.
oran_api_kpm_caller_violationhighA non-RIC process accessed KPM-related interfaces.
oran_api_high_volumewarningHigh-volume O-RAN API or KPM behavior was observed.
oran_api_f1e1_boundaryhighA non-authorized process crossed the F1 or E1 interface boundary.

Event structure

Every event delivered to the Console has this normalized structure:

FieldDescription
event_idUnique identifier in the format {event_kind}_{timestamp}_{hash}
event_kindThe event kind string from this reference
severityinfo, warning, high, or critical
observed_atISO 8601 timestamp when the event occurred
process_executableFull path of the process
process_nameProcess name (comm)
process_pidProcess ID
process_uidUser ID of the process
parent_executableFull path of the parent process
parent_pidParent process ID
ancestors_jsonJSON-encoded ancestor chain
k8s_namespaceKubernetes namespace (if applicable)
k8s_pod_nameKubernetes pod name (if applicable)
nf_roleDeclared NF role of the sensor (telecom flavor)
detected_classMITRE-style detection class label
messageHuman-readable event description
suppressedWhether this event is suppressed by an active suppression rule
pack_idPolicy pack that generated the event

Filtering events by kind

Filter events by kind using the event kind dropdown in the Events view. Select one or more event kinds from the dropdown to narrow the event list to matching records.

📸 Screenshot: events-kind-filter Events view showing the event kind dropdown filter with a list of available kinds and a multi-select interface.


Further reading

Released under the Telovix Commercial License.