Splunk Enterprise Security

How to identify eventtype in props.conf

shayhibah
Path Finder

Hey,

I have one sourcetype named "my_sourcetype".

Since I would like to integrate with Splunk ES, I need to map my field values into expected values.

Each data model (eventtype) is defined in eventtypes.conf file based on my product name.

For example:

[Data_Loss_Prevention]
search = product="*DLP*"

[Malware]
search = product="*Malware*"

Since one field (for example: action) may have different expected values for each data model, in my props.conf file I need to map the value to the expected value based on the correct DM.

Since eventtype happens after EVAL in search-time process, I cannot use eventtype field and I have no way to identify which data model is it (just to mention that I do not want to copy the logic of eventtypes.conf into props.conf to avoid redundancy).

 

Can you think on a better way to do this?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The best way to map your fields to expected (I assume you mean CIM) fields is with aliases.  Add FIELDALIAS to your props.conf file(s) as necessary.

You also may need to modify event types so they can find your data.

---
If this reply helps you, Karma would be appreciated.
0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...