<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: JSON to CIM mapping in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502219#M8862</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/50519"&gt;@loginsoftresear&lt;/a&gt;ch &lt;BR /&gt;
to begin with, you would want to understand what DataModel the JSON is most relevant too, so look into this guide for that.&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/Howtousethesereferencetables" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/Howtousethesereferencetables&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Download and Install the Splunk CIM app on the SH or SHC:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1621/" target="_blank"&gt;https://splunkbase.splunk.com/app/1621/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Lastly, you want to go through this and follow the details which apply:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/HowtouseCIM" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/HowtouseCIM&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;This is something I follow:&lt;BR /&gt;
Run the &lt;CODE&gt;index=IndexName sourcetype=SourcetType&lt;/CODE&gt; search for the last 24 hours. I then write the evals / field alias in spl and check that the mapping is correct and returns all the fields. EG: &lt;BR /&gt;
eval action = if(isnull(action_success),if(isnotnull(action_failure),"failure",null()),"success")&lt;BR /&gt;
rex field=_raw Message=(?[^.]*)&lt;/P&gt;

&lt;P&gt;which would be as such in local/props.conf&lt;BR /&gt;
[SourceType]&lt;BR /&gt;
EVAL-action = if(isnull(action_success),if(isnotnull(action_failure),"failure",null()),"success")&lt;BR /&gt;
EXTRACT-signature = Message=(?[^.]*)&lt;/P&gt;

&lt;P&gt;local/eventtypes.conf&lt;BR /&gt;
[EventType]&lt;BR /&gt;
search=index=IndexName sourcetype=SourcetType&lt;/P&gt;

&lt;H1&gt;tag = authentication ### note: i add the # tag reference here so its easier later on when there are many mappings&lt;/H1&gt;

&lt;P&gt;local/tags.conf &lt;BR /&gt;
[eventtype=EventType]&lt;BR /&gt;
authentication = enabled&lt;/P&gt;

&lt;H2&gt;add any other tags that apply&lt;/H2&gt;

&lt;P&gt;Once this is complete, you would want to restart the SH(C) and run the &lt;CODE&gt;index=IndexName sourcetype=SourcetType&lt;/CODE&gt; search to see that the fields extracted are displayed in the panel.&lt;/P&gt;

&lt;P&gt;Also make yourself familiar with tstats and how to search through the datamodels:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/Tstats" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/Tstats&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Note: Before jumping into data model acceleration read this doc. &lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels&lt;/A&gt;&lt;BR /&gt;
Some of the things to note are: the root object mapping, storage impact, acceleration and impact on searches etc.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 04:44:50 GMT</pubDate>
    <dc:creator>anmolpatel</dc:creator>
    <dc:date>2020-09-30T04:44:50Z</dc:date>
    <item>
      <title>JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502218#M8861</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;We have a scripted input, which indexes JSON data into Splunk and using SPATH we have writing our correlation rules. Now that we have Splunk ES, we would like to map JSON data to CIM in Splunk. Can anyone please guide us to understand how and is it possible to map JSON to CIM in Splunk which can be used in Splunk ES.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2020 05:25:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502218#M8861</guid>
      <dc:creator>loginsoftresear</dc:creator>
      <dc:date>2020-03-20T05:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502219#M8862</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/50519"&gt;@loginsoftresear&lt;/a&gt;ch &lt;BR /&gt;
to begin with, you would want to understand what DataModel the JSON is most relevant too, so look into this guide for that.&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/Howtousethesereferencetables" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/Howtousethesereferencetables&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Download and Install the Splunk CIM app on the SH or SHC:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/1621/" target="_blank"&gt;https://splunkbase.splunk.com/app/1621/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Lastly, you want to go through this and follow the details which apply:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/CIM/4.15.0/User/HowtouseCIM" target="_blank"&gt;https://docs.splunk.com/Documentation/CIM/4.15.0/User/HowtouseCIM&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;This is something I follow:&lt;BR /&gt;
Run the &lt;CODE&gt;index=IndexName sourcetype=SourcetType&lt;/CODE&gt; search for the last 24 hours. I then write the evals / field alias in spl and check that the mapping is correct and returns all the fields. EG: &lt;BR /&gt;
eval action = if(isnull(action_success),if(isnotnull(action_failure),"failure",null()),"success")&lt;BR /&gt;
rex field=_raw Message=(?[^.]*)&lt;/P&gt;

&lt;P&gt;which would be as such in local/props.conf&lt;BR /&gt;
[SourceType]&lt;BR /&gt;
EVAL-action = if(isnull(action_success),if(isnotnull(action_failure),"failure",null()),"success")&lt;BR /&gt;
EXTRACT-signature = Message=(?[^.]*)&lt;/P&gt;

&lt;P&gt;local/eventtypes.conf&lt;BR /&gt;
[EventType]&lt;BR /&gt;
search=index=IndexName sourcetype=SourcetType&lt;/P&gt;

&lt;H1&gt;tag = authentication ### note: i add the # tag reference here so its easier later on when there are many mappings&lt;/H1&gt;

&lt;P&gt;local/tags.conf &lt;BR /&gt;
[eventtype=EventType]&lt;BR /&gt;
authentication = enabled&lt;/P&gt;

&lt;H2&gt;add any other tags that apply&lt;/H2&gt;

&lt;P&gt;Once this is complete, you would want to restart the SH(C) and run the &lt;CODE&gt;index=IndexName sourcetype=SourcetType&lt;/CODE&gt; search to see that the fields extracted are displayed in the panel.&lt;/P&gt;

&lt;P&gt;Also make yourself familiar with tstats and how to search through the datamodels:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/Tstats" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/SearchReference/Tstats&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Note: Before jumping into data model acceleration read this doc. &lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.2/Knowledge/Acceleratedatamodels&lt;/A&gt;&lt;BR /&gt;
Some of the things to note are: the root object mapping, storage impact, acceleration and impact on searches etc.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:44:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502219#M8862</guid>
      <dc:creator>anmolpatel</dc:creator>
      <dc:date>2020-09-30T04:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502220#M8863</link>
      <description>&lt;P&gt;We are indexing JSON data as raw data into Splunk, can you please guide us.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 12:09:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502220#M8863</guid>
      <dc:creator>loginsoftresear</dc:creator>
      <dc:date>2020-03-23T12:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502221#M8864</link>
      <description>&lt;P&gt;@loginsoftresearch  can you post a sample data set and what model it needs to be mapped to ? &lt;BR /&gt;
Please eliminate all sensitive info. Also the method of ingestion. &lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2020 00:40:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502221#M8864</guid>
      <dc:creator>anmolpatel</dc:creator>
      <dc:date>2020-03-26T00:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502222#M8865</link>
      <description>&lt;P&gt;We tried to map CVE field in the Vulnerabilities data model. We have created related tags but data doesn't show in the Vulnerabilities data model when we called by tag in the pivot.&lt;/P&gt;

&lt;P&gt;Another error we get when we tried to extract "id/name" field from above JSON using Regexis as follows:&lt;BR /&gt;
"The extraction failed. If you are extracting multiple fields, try removing one or more fields. Start with extractions that are embedded within longer text strings."&lt;/P&gt;

&lt;P&gt;We want to convert the above JSON to the CIM model which has to be mapped to the Vulnerabilities data model.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;findings_summary: [ [-]
     { [-]
       end_date: 1020-01-26
       start_date: 1019-11-27
       stats: [ [-]
         { [-]
           confidence: LOW
           event_count: 1
           first_seen: 1019-11-06
           host_count: 1
           id: CVE-2011-0117
           name: CVE-2011-0117
           severity: 7.30
           severity_category: null
         }
         { [-]
           confidence: HIGH
           event_count: 3
           first_seen: 10019-08-05
           host_count: 3
           id: CVE-2011-11581
           name: CVE-2011-11581
           severity: 9.80
           severity_category: null
         }
         { [-]
           confidence: LOW
           event_count: 1
           first_seen: 2011-11-06
           host_count: 1
           id: CVE-2014-0118
           name: CVE-2014-0118
           severity: 5.30
           severity_category: null
         }
]
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 28 Mar 2020 03:10:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502222#M8865</guid>
      <dc:creator>loginsoftresear</dc:creator>
      <dc:date>2020-03-28T03:10:30Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502223#M8866</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;|makeresults
| eval _raw="{\"findings_summary\": [
      {
        \"end_date\": \"1020-01-26\",
        \"start_date\": \"1019-11-27\",
        \"stats\": [
          {
            \"confidence\": \"LOW\",
            \"event_count\": \"1\",
            \"first_seen\": \"1019-11-06\",
            \"host_count\": \"1\",
            \"id\": \"CVE-2011-0117\",
            \"name\": \"CVE-2011-0117\",
            \"severity\": \"7.30\",
            \"severity_category\": \"null\"
          },
          {
            \"confidence\": \"HIGH\",
            \"event_count\": \"3\",
            \"first_seen\": \"10019-08-05\",
            \"host_count\": \"3\",
            \"id\": \"CVE-2011-11581\",
            \"name\": \"CVE-2011-11581\",
            \"severity\": \"9.80\",
            \"severity_category\": \"null\"
          },
          { 
            \"confidence\": \"LOW\",
            \"event_count\": \"1\",
            \"first_seen\": \"2011-11-06\",
            \"host_count\": \"1\",
            \"id\": \"CVE-2014-0118\",
            \"name\": \"CVE-2014-0118\",
            \"severity\": \"5.30\",
            \"severity_category\": \"null\"
          }
 ] }"
 | spath path=findings_summary{}.end_date output=end_date
 | spath path=findings_summary{}.start_date output=start_date
 | spath path="findings_summary{}.stats{}" output=json
 | stats values(*_date) as *_date by json
 | spath input=json
 | fields - json
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I haven't try following conf:&lt;/P&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;KV_MODE = json
FIELDALIAS-cim = findings_summary{}.stats{}.id AS cve
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;reference: &lt;A href="https://docs.splunk.com/Documentation/CIM/latest/User/Vulnerabilities"&gt;https://docs.splunk.com/Documentation/CIM/latest/User/Vulnerabilities&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2020 04:02:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502223#M8866</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-28T04:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502224#M8867</link>
      <description>&lt;P&gt;Thank you, I could able to extract values of id when   FIELDALIAS-cim = findings_summary{}.stats{}.id AS cve to props.conf, but when clicked on individual results, I was not able to see the indexed log or is there anyway I can show results as above SPL query.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 05:03:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502224#M8867</guid>
      <dc:creator>loginsoftresear</dc:creator>
      <dc:date>2020-03-30T05:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502225#M8868</link>
      <description>&lt;P&gt;&lt;CODE&gt;cim&lt;/CODE&gt; field:ok&lt;BR /&gt;
&lt;CODE&gt;findings_summary{}.stats{}.id&lt;/CODE&gt; field:ok&lt;BR /&gt;
&lt;CODE&gt;findings_summary{}.stats{}.severity&lt;/CODE&gt; field:ok&lt;BR /&gt;
right?&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 09:19:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/502225#M8868</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-03-30T09:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: JSON to CIM mapping</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/523474#M9368</link>
      <description>&lt;P&gt;Has anyone been able to map Wazuh JSON alerts that are forwarded in JSON format to raw/XML for Spunk ES Windows event stanza and Windows TA app?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 16:14:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/JSON-to-CIM-mapping/m-p/523474#M9368</guid>
      <dc:creator>gurulee</dc:creator>
      <dc:date>2020-10-07T16:14:11Z</dc:date>
    </item>
  </channel>
</rss>

