All Apps and Add-ons

Splunk Add-on for Microsoft Windows: Is this a bug with the field alias for severity_id in props.conf?

otaci
Explorer

In file default/props.conf the following aliases are defined:

[source::(MonitorWare|NTSyslog|Snare|WinEventLog|WMI:WinEventLog)...]
...
FIELDALIAS-severity_for_windows = Type as severity
FIELDALIAS-severity_id_for_windows = EventType as severity
...

Is this a bug? Should the second alias not read:

FIELDALIAS-severity_id_for_windows = EventType as severity_id

I've corrected this by overriding with a correction section in local/props.conf.

1 Solution

jcoates_splunk
Splunk Employee
Splunk Employee

Yes, I agree. Filed as a bug.

View solution in original post

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

Yes, I agree. Filed as a bug.

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...