Getting Data In

Possible to set fields in transforms.conf for a field in a JSON formatted event?

jwalzerpitt
Influencer

We are using the Splunk Shibboleth add on app but unfortunately our Shib audit events are formatted as JSON and it's nullifying the audit fields in the transforms.conf file:

[shibboleth:audit-fields]
DELIMS    = "|"
FIELDS    = auditEventTime,requestBinding,requestId,relyingPartyId,messageProfileId,assertingPartyId,responseBinding,responseId,principalName,authNMethod,releasedAttributeId1,releasedAttributeId2,nameIdentifier,assertion1ID,assertion2ID

All of the K/V pairs that should be parsed are in the 'Event' field in the JSON formatted event with the | delimiter.

Is there a way to modify the transforms.conf file so that it looks in the Event field for the values to parse?

0 Karma

woodcock
Esteemed Legend

To turn off automatic JSON interpretation, do this on your search head:

[shibboleth:audit-fields]
KV_MODE = none
AUTO_KV_JSON = false
0 Karma
Get Updates on the Splunk Community!

Leveraging Detections from the Splunk Threat Research Team & Cisco Talos

  Now On Demand  Stay ahead of today’s evolving threats with the combined power of the Splunk Threat Research ...

New in Splunk Observability Cloud: Automated Archiving for Unused Metrics

Automated Archival is a new capability within Metrics Management; which is a robust usage & cost optimization ...

Calling All Security Pros: Ready to Race Through Boston?

Hey Splunkers, .conf25 is heading to Boston and we’re kicking things off with something bold, competitive, and ...