All Apps and Add-ons

Splunk Add-on for Cisco Identity Services: How to prevent the UserName field from being overwritten by overlapping field aliases?

stboch
SplunkTrust
SplunkTrust

There are several overlapping field aliases causing inconsistent issues.

I recommend the following changes.

Before:

FIELDALIAS-cisco-ise-user_name-as-UserName = User_Name AS UserName

After:

FIELDALIAS-cisco-ise-user_name-as-UserName = User_Name AS user

The UserName field is used in part of the ISE log services, and is being overwritten inconsistently with blank data.

0 Karma
1 Solution

stboch
SplunkTrust
SplunkTrust

I recommend the following changes.

Before:

FIELDALIAS-cisco-ise-user_name-as-UserName = User_Name AS UserName

After:

FIELDALIAS-cisco-ise-user_name-as-UserName = User_Name AS user

View solution in original post

stboch
SplunkTrust
SplunkTrust

I recommend the following changes.

Before:

FIELDALIAS-cisco-ise-user_name-as-UserName = User_Name AS UserName

After:

FIELDALIAS-cisco-ise-user_name-as-UserName = User_Name AS user

ppablo
Retired

Hi @stboch

Thanks for sharing this tip on Splunk Answers for the rest of the community. Could you actually post the solution below in the "Enter your answer here..." box? We can then accept the answer to resolve the post so this question displays as having a working solution.

0 Karma

stboch
SplunkTrust
SplunkTrust

I copied the information into an answer

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...