Knowledge Management

How to set up a field alias for a field that's already in the data for CIM compliance?

mrtolu6
Path Finder

I'm trying to create a field alias for Enterprise Security so that the category field will generate correctly in the IDS Center in Splunk

My data source has a field name category that gives category on URL events and it also has a threat_category that gives details on the threat category. I'm trying to set up a field alias that would allow the CIM to pick up the threat_category so that it will will generate in Enterprise security and will ignore the original category which will only give the url category. What would be the best way to do this?

0 Karma

maciep
Champion

Creating a field alias should be simple enough in props.conf:

[your_sourcetype]
FIELDALIAS-category = threat_category as category

But depending on how the original category fields are created, I'm not sure if this will overwrite it OR will it overwrite this. Or the threat_category field may not even exist yet when this alias is called.

Do you know how those fields are created? Are they extractions, evals, lookups etc? That will probably drive the approach you have to take, including if you want to keep the original category value around in some other field.

See the doc below which describes the search time operation sequence
http://docs.splunk.com/Documentation/Splunk/7.0.0/Knowledge/Searchtimeoperationssequence

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...