<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why is Field Alias not applying? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Field-Alias-not-applying/m-p/656001#M226564</link>
    <description>&lt;P&gt;Check the TA default configs or anything else for field aliases or evals that have the same name i.e. FIELDALIAS-user and EVAL-user in props or GUI. Either remove the duplicate field alias or eval, or rename them like FIELDALIAS-userTest and see if the new field pops up. I know the Crowdstrike TA 3.1.6 has duplicate names for user and severity which causes Splunk to drop the alias or eval altogether&lt;/P&gt;</description>
    <pubDate>Tue, 29 Aug 2023 17:33:29 GMT</pubDate>
    <dc:creator>dannymcdonald</dc:creator>
    <dc:date>2023-08-29T17:33:29Z</dc:date>
    <item>
      <title>Why is Field Alias not applying?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Field-Alias-not-applying/m-p/648597#M224378</link>
      <description>&lt;P&gt;Hey all,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When i run a search like this:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=crowdstrike_pci sourcetype=crowdstrike:events:sensor event_simpleName=FileIntegrityMonitorRuleMatched | rename CommandLine AS process ContextTimeStamp AS file_access_time ImageFileName AS file_path ObjectName AS file_name ParentBaseFileName AS parent_process_exec ParentBaseFileName AS parent_process_name ParentCommandLine AS parent_process ParentImageFileName AS parent_process_path ParentProcessId AS parent_process_id RawProcessId AS process_id SHA256HashData AS file_hash UserName AS user aip AS dest event_platform AS os&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The fields populate correctly, but when i hit up the Field Alias settings in the GUI to make them permanent, they dont appear in the search. Permissions are set for everyone to read all, and for sc_admin to write them. Its Splunk Cloud so i dont have access to the props.conf unless i upload one myself, but the field alias works for other sourcetypes, just not this one.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2023 15:12:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Field-Alias-not-applying/m-p/648597#M224378</guid>
      <dc:creator>joshuasolman</dc:creator>
      <dc:date>2023-06-30T15:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Why is Field Alias not applying?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-is-Field-Alias-not-applying/m-p/656001#M226564</link>
      <description>&lt;P&gt;Check the TA default configs or anything else for field aliases or evals that have the same name i.e. FIELDALIAS-user and EVAL-user in props or GUI. Either remove the duplicate field alias or eval, or rename them like FIELDALIAS-userTest and see if the new field pops up. I know the Crowdstrike TA 3.1.6 has duplicate names for user and severity which causes Splunk to drop the alias or eval altogether&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 17:33:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-is-Field-Alias-not-applying/m-p/656001#M226564</guid>
      <dc:creator>dannymcdonald</dc:creator>
      <dc:date>2023-08-29T17:33:29Z</dc:date>
    </item>
  </channel>
</rss>

