Network Events
When an AP is dropping clients or a switch port keeps flapping, you don't want to wade through IDS alerts to find the signal. The Network Events page surfaces operational events on their own page.
What's a "Network Event"?
Every event Sentinel ingests gets an event_class field, automatically derived from its category:
security IDS alerts, firewall denies, auth failures on exposed services
network Link state, AP radio, DHCP, WAN/VPN tunnels, controller lifecycle
audit Admin logins, config changes, backups, user actions
system Kernel messages, systemd, unclassified infrastructure
unknown Generic fallback — pre-upgrade events or truly unclassifiable The Events page shows class=security by default. The Network Events page shows class=network.
What's Parsed
Sentinel ships with structured parsers for the syslog formats UniFi devices emit. Each produces fully populated events with the structured fields pre-extracted (no grep-the-message needed):
iptables Firewall
- Rule name, action (Accept/Drop/Reject)
- 5-tuple (src/dst IP+port, protocol)
- Source + destination MAC, input/output interface
- TCP flags, packet length, TTL
Suricata IDS
- Signature ID + revision, rule name, classification
- Priority → severity mapping (1 → Critical, 2 → High, 3 → Medium, 4+ → Low)
- Full 5-tuple
hostapd Wireless
- Radio interface (
ath0,wifi1ap4, etc.) - Station MAC, association state (authenticated, associated, disassociated, deauthenticated)
- Automatically tagged
wireless
dnsmasq DHCP
- DHCP op (DISCOVER, OFFER, ACK, NAK, RELEASE)
- Assigned IP, client MAC, hostname, interface
Link / Port State
- Port up/down, speed, duplex
- PoE enabled/disabled/overload/fault/shortage
- Severity escalates: overload/fault → High, disabled/denied → Low
AP Radio
- DFS radar detection (
DFS-RADAR-DETECTED) with frequency - Channel switches
- CAC (Channel Availability Check) start / complete / abort
WAN / VPN
- pppd connect/terminate/authenticate
- dhcpcd lease ACK/NAK
- OpenVPN, strongSwan (IPSec) tunnel state transitions
Controller Lifecycle
- Device adoption, provisioning, upgrade, reboot
- Configuration apply
- Device MAC extracted when present
Admin / Auth
- SSH Accepted / Failed with username + source IP
- PAM sessions (opened, closed, auth success, auth failure)
- Generic login/logout events
- Tagged
auditclass — shows up in the Audit filter
Device Drill-Down
Every event Sentinel parses carries a device_ip. The Network Events page has a device dropdown populated from the Devices API, letting you filter to "everything from AP-kitchen" in one click. Use the tag chips (link, wireless, wan, controller, dfs, poe) to narrow further.
Sending debug-level logs
Self-Monitoring
If the SIEM host itself runs UniFi controller software or other services you want to monitor, enable the host syslog collector:
[host_syslog]
enabled = true This tails journalctl on the host and routes every line through the same parser stack. Events are tagged host-log.