Security

How do I create a new field?

or1515
Loves-to-Learn Everything

Hey splunkers,

How do I create a new field in splunk?

 

If I have a windows security log with "User" field and I want to call it and use it as "Account".

I tried we Eval but didn't succeed. 

Thanks.

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

There are several ways to create a field, but eval perhaps is the most common.  Please share your attempt so we can help determine what went wrong.

---
If this reply helps you, Karma would be appreciated.
0 Karma

or1515
Loves-to-Learn Everything

This is the query:

index="net" sourcetype="Okta" eventType="user.account.privilege.grant"
In the log there is field called "Username".
I want to change it to "User".

You ask why? 
I want to write a correlation rule from 2 different indexes and I want to use the same field for both.
Im waiting for an answer here: https://community.splunk.com/t5/Security/Correlation-rule/m-p/566419#M15581

0 Karma

isoutamo
SplunkTrust
SplunkTrust
Hi
try "rename Username as User"
r. Ismo
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...