Getting Data In

Possible to set fields in transforms.conf for a field in a JSON formatted event?

jwalzerpitt
Influencer

We are using the Splunk Shibboleth add on app but unfortunately our Shib audit events are formatted as JSON and it's nullifying the audit fields in the transforms.conf file:

[shibboleth:audit-fields]
DELIMS    = "|"
FIELDS    = auditEventTime,requestBinding,requestId,relyingPartyId,messageProfileId,assertingPartyId,responseBinding,responseId,principalName,authNMethod,releasedAttributeId1,releasedAttributeId2,nameIdentifier,assertion1ID,assertion2ID

All of the K/V pairs that should be parsed are in the 'Event' field in the JSON formatted event with the | delimiter.

Is there a way to modify the transforms.conf file so that it looks in the Event field for the values to parse?

0 Karma

woodcock
Esteemed Legend

To turn off automatic JSON interpretation, do this on your search head:

[shibboleth:audit-fields]
KV_MODE = none
AUTO_KV_JSON = false
0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...