Getting Data In

Fortinet filed extractions

g_paternicola
Path Finder

Hi everyone,

I'm getting probably an issue with the extraction of my Fortinet data. I have installed the following apps:

 

Fortinet FortiGate App for SplunkSplunkAppForFortinet

1.5.1

Fortinet Fortigate Add-on for SplunkSplunk_TA_fortinet_fortigate1.6.2

 

Does anyone know the different of the field action and ftnt_action? because I'm getting different results there. 

In field action do I have for example "blocked" but in ftnt_action do I have "detected" and also "dropped". This is a bit confusing while I'm trying to get only blocked attacks. 

Could someone please help me?

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...